{"componentChunkName":"component---src-templates-blog-list-template-js","path":"/97","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"excerpt":"In the whole software development process, QA testing has a unique space. QA is responsible for ensuring that developed software is bug-free…","fields":{"slug":"/engineering/challenges-faced-by-qa/"},"html":"<p>In the whole software development process, QA testing has a unique space. QA is responsible for ensuring that developed software is bug-free and works concerning technical and business requirements.</p>\n<p>QA engineers must have a good understanding of each project and what it means to accomplish. They must deliver quality software to the clients.</p>\n<p>Given the responsibility of a QA's job, it is natural to face many challenges in their day-to-day tasks. This article will help to understand the most common of those challenges faced by any QA.</p>\n<h3 id=\"1-unstable-environment\" style=\"position:relative;\"><a href=\"#1-unstable-environment\" aria-label=\"1 unstable environment permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Unstable Environment</h3>\n<p>Usually, QA teams face unstable environment setup issues that we need to prepare for most of what we have. Sometimes the server gets stuck due to overload and requires a restart many times during testing etc.</p>\n<p>Escalate these issues to the seniors and make sure you get the environment <a href=\"https://www.loginradius.com/blog/engineering/unit-testing/\">ready for the testing</a>.</p>\n<h3 id=\"2-tools-being-force-fed\" style=\"position:relative;\"><a href=\"#2-tools-being-force-fed\" aria-label=\"2 tools being force fed permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Tools Being Force-fed</h3>\n<p>Now and then, we realize that a tool is not the right choice for the project. We do not have any other option but to keep using it because the clients/organization already have licenses and would not go for a new one until the current license expires.</p>\n<p>It is not fun, but you learn alternate options. Or at least, one can conclude with regards to if the possibilities work.</p>\n<h3 id=\"3-tight-deadlines\" style=\"position:relative;\"><a href=\"#3-tight-deadlines\" aria-label=\"3 tight deadlines permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Tight Deadlines</h3>\n<p>The biggest challenge QA is to receive requests for last-minute testing. The primary reasons for such demands are that the development process takes more time than expected and the time for testing is underestimated. Generally, testing and debugging take 50% of the development time. When QA has a short time frame for verification, they should check software against the main business specifications. Software testing should begin at least three days of release.  </p>\n<h3 id=\"4-testing-documents-created-by-others\" style=\"position:relative;\"><a href=\"#4-testing-documents-created-by-others\" aria-label=\"4 testing documents created by others permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. Testing Documents Created By Others</h3>\n<p>In the case of QA, it's faster to create a document from scratch than to use the one created by others. Using test cases created by others increases the time of verification and puts limits as far as discovering bugs.</p>\n<h3 id=\"5-friday-releases\" style=\"position:relative;\"><a href=\"#5-friday-releases\" aria-label=\"5 friday releases permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. Friday Releases</h3>\n<p>Everybody thinks of the successful releases of new features or products, but the reality could be different. From our testing experience, the software doesn't typically release from the first time in most cases. The best time for releasing the software is the start of the week. Thus it gives development and QA teams the rest of the week to manage with whatever comes up.  </p>\n<h3 id=\"6-wrong-testing-estimation\" style=\"position:relative;\"><a href=\"#6-wrong-testing-estimation\" aria-label=\"6 wrong testing estimation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>6. Wrong Testing Estimation</h3>\n<p>While trying to make an accurate estimate, some software estimations could be entirely unpredictable and go wrong. As developers, QA also doesn't have 100% security from unexpected issues.</p>\n<h3 id=\"7-fixing-bugs-during-testing\" style=\"position:relative;\"><a href=\"#7-fixing-bugs-during-testing\" aria-label=\"7 fixing bugs during testing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>7. Fixing Bugs During Testing</h3>\n<p>Developers and QA engineers should work closely. <a href=\"https://www.loginradius.com/blog/engineering/qa-teams-deliver-quality-software/\">Testing should be done</a> once part of the development process is done, and after that, bug fixing activity should start. QA submit a test report and only after that debugging begins.</p>\n<h3 id=\"8-last-minute-changes-to-requirements\" style=\"position:relative;\"><a href=\"#8-last-minute-changes-to-requirements\" aria-label=\"8 last minute changes to requirements permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>8. Last-Minute Changes to Requirements</h3>\n<p>It is slightly common to change project requirements mid-sprint in agile development projects. While this can be frustrating for the team and due to that testers can be affected. They may need to re-try the whole extent of testing since even the littlest changes to a codebase should be gone through various tests to guarantee its steadiness and similarity with existing code.</p>\n<p>Naturally, last-minute changes in the requirement can be difficult for testers to deal with, especially if there are tight deadlines to deliver results.</p>\n<h3 id=\"9-insufficient-coordinated-effort-among-developers-and-testers\" style=\"position:relative;\"><a href=\"#9-insufficient-coordinated-effort-among-developers-and-testers\" aria-label=\"9 insufficient coordinated effort among developers and testers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>9. Insufficient Coordinated Effort Among Developers and Testers</h3>\n<p>Professional differences between development and testing teams are still common. Developers think that testing is a final process of the software development life cycle, and testers do not require anything apart from a list of user journeys and technical requirements.</p>\n<p>However, testers may have difficulty identifying flaws in the code if they are not acquainted with the development process. If they do not understand how the software works, they will have trouble creating test cases to find all possible bugs.</p>\n<h3 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h3>\n<p>Resolving the challenges mentioned above will not only make the lives of QA testers much easier. Still, it will also streamline the <a href=\"https://www.intellias.com/offshore-software-development/\">software development process</a> to make it more useful and time-efficient. By making it easy for QAs to do their job well, organizations can ensure that their products meet all business requirements and function in the best possible way.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 05, 2021","updated_date":null,"description":"Software testing is a difficult task in and of itself. Top 9 QA challenges that any tester in the software testing industry would face are discussed in clear terms here.","title":"Top 9 Challenges Faced by Every QA","tags":["QA","Processes","Testing"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.9047619047619047,"src":"/static/3cb5bace33cd7de67d48a1447d9512a7/58556/testing-challenges.webp","srcSet":"/static/3cb5bace33cd7de67d48a1447d9512a7/61e93/testing-challenges.webp 200w,\n/static/3cb5bace33cd7de67d48a1447d9512a7/1f5c5/testing-challenges.webp 400w,\n/static/3cb5bace33cd7de67d48a1447d9512a7/58556/testing-challenges.webp 800w,\n/static/3cb5bace33cd7de67d48a1447d9512a7/99238/testing-challenges.webp 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Neha Vyas","github":"nehavyasqa","avatar":null}}}},{"node":{"excerpt":"Serverless computing has been gaining a lot of popularity in the last couple of years, and for a good reason. It saves developer's time…","fields":{"slug":"/engineering/serverless-overview/"},"html":"<p>Serverless computing has been gaining a lot of popularity in the last couple of years, and for a good reason. It saves developer's time, allowing them to <a href=\"https://www.loginradius.com/blog/engineering/learning-how-to-code/\">focus on writing code</a> rather than dealing with infrastructure. Deploying powerful and scalable applications has generally become much quicker and easier with serverless. However, there can be drawbacks as well, such as vendor lock-in and lack of control.</p>\n<p>This blog will briefly go over some of the most popular serverless computing options from major cloud providers. There are also plenty of great resources online explaining serverless architecture in detail, so definitely go check those out if you haven't already. Now, let's go over some of the popular choices for serverless computing.</p>\n<h2 id=\"popular-cloud-options\" style=\"position:relative;\"><a href=\"#popular-cloud-options\" aria-label=\"popular cloud options permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Popular Cloud Options</h2>\n<p>Almost all major cloud providers offer serverless computing such as AWS, Azure, Google Cloud, IBM Cloud, Alibaba Cloud, etc. In this blog, we'll only be going over a few.</p>\n<h3 id=\"1-aws-lambda\" style=\"position:relative;\"><a href=\"#1-aws-lambda\" aria-label=\"1 aws lambda permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. AWS Lambda</h3>\n<p>AWS Lambda was released in 2014 and has played a significant role in the rise of serverless computing.</p>\n<ul>\n<li>Lambda functions run using <a href=\"https://github.com/firecracker-microvm/firecracker\">AWS Firecracker</a>, an open-source virtualization project that focuses on securing and isolating functions while enabling the best performance possible.</li>\n<li>It supports plenty of runtimes: Node.js, Python, Ruby, Java, Go, .NET Core, and even custom runtimes for cases where the desired runtime is not natively supported.</li>\n<li>An excellent way to get support is through their official public <a href=\"https://forums.aws.amazon.com/forum.jspa?forumID=186\">forum</a>, where AWS employees can answer your questions.</li>\n<li><a href=\"https://www.loginradius.com/blog/engineering/a-journey-with-AWS/\">AWS Lambda offers</a> free usage of 1M requests per month and 400,000 GB-seconds of computing time per month.</li>\n</ul>\n<p>Recent notable updates include:</p>\n<ul>\n<li><a href=\"https://aws.amazon.com/blogs/aws/new-for-aws-lambda-container-image-support/\">Dec 2020</a>: Function's can be defined as container images up to 10GB. Previously a function's code had to be written through the UI code editor or uploaded as zip archives.</li>\n<li><a href=\"https://aws.amazon.com/blogs/aws/new-for-aws-lambda-functions-with-up-to-10-gb-of-memory-and-6-vcpus/\">Dec 2020</a>: Function's memory can be configurable up to 10GB. Previously, the memory limit was 3GB, so this is an increase of over three times. Since Lambda automatically allocates CPU in proportion to the memory limit, there can be up to 6 vCPUs.</li>\n<li><a href=\"https://aws.amazon.com/blogs/aws/new-for-aws-lambda-1ms-billing-granularity-adds-cost-savings/\">Dec 2020</a>: For pricing calculation, function execution duration, rounded up to the nearest 1ms. Previously, duration was nearest to 100ms, which means lower cost for functions executing under 100ms.</li>\n<li><a href=\"https://aws.amazon.com/blogs/aws/new-a-shared-file-system-for-your-lambda-functions/\">June 2020</a>: Share a file system between Lambda functions via Amazon EFS.</li>\n</ul>\n<h3 id=\"2-azure-functions\" style=\"position:relative;\"><a href=\"#2-azure-functions\" aria-label=\"2 azure functions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Azure Functions</h3>\n<p>Launched in 2016:</p>\n<ul>\n<li>Part of the open-source initiative, which started back when Microsoft purchased GitHub in 2018. This includes the Azure function runtime, core tools, portal, and more. Check them out <a href=\"https://github.com/Azure/Azure-Functions\">here</a>!</li>\n<li>Runtime support includes .NET Framework, .NET Core, Node.js, Java, Python, and more.</li>\n<li>Offers free usage of 1M requests per month and 400,000 GB-seconds of computing time per month.</li>\n</ul>\n<p>Recent notable updates include:</p>\n<ul>\n<li><a href=\"https://azure.microsoft.com/en-us/updates/azure-functions-custom-handlers-are-now-generally-available/\">Dec 2020</a>: Custom handlers are now supported, allowing creating functions in any runtime.</li>\n<li><a href=\"https://azure.microsoft.com/en-gb/updates?id=rabbitmq-extension-for-windows-and-linux-is-now-generally-available\">Dec 2020</a>: Functions can now send and receive messages to and from RabbitMQ.</li>\n</ul>\n<h3 id=\"3-google-cloud-functions\" style=\"position:relative;\"><a href=\"#3-google-cloud-functions\" aria-label=\"3 google cloud functions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Google Cloud Functions</h3>\n<p>Launched in 2017:</p>\n<ul>\n<li>Run with the help of <a href=\"https://github.com/google/gvisor\">gVisor</a> for sandboxing containers. Since containers were never designed to be secure sandboxes, gVisor is a tool Google built to protect against potential vulnerabilities allowing container escapes and others.</li>\n<li>Runtime support includes Node.js, Go, Ruby, Java, Python, .NET Core.</li>\n<li>Offers free usage of 2M requests per month and 400,000 GB-seconds of computing time per month. Allows 1M more free requests per month compared to AWS and Azure!</li>\n</ul>\n<p>Recent notable updates include:</p>\n<ul>\n<li><a href=\"https://cloud.google.com/blog/products/application-development/ruby-comes-to-cloud-functions\">Jan 2021</a>: Support Ruby runtime.</li>\n<li><a href=\"https://cloud.google.com/blog/products/application-development/introducing-net-google-cloud-functions\">Nov 2020</a>: Support .NET Core runtime.</li>\n</ul>\n<h3 id=\"4-cloudflare-workers\" style=\"position:relative;\"><a href=\"#4-cloudflare-workers\" aria-label=\"4 cloudflare workers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. CloudFlare Workers</h3>\n<p>Launched in 2017:</p>\n<ul>\n<li>Takes advantage of Cloudflare's edge locations for excellent performance.</li>\n<li>Run using the V8 JavaScript engine, allowing for much less overhead than using VMs or containers.</li>\n<li>V8 engine allows Cloudflare Workers to run JavaScript. V8 engine includes languages that can compile to WebAssembly, such as Rust, C, Cobol. Also, languages that can compile to JavaScript, such as Python, Kotlin, Perl.</li>\n<li>Offers free usage of 100,000 requests per day and a 128MB worker memory limit. Details on all their free plan restrictions <a href=\"https://developers.cloudflare.com/workers/platform/limits#worker-limits\">here</a>.</li>\n</ul>\n<p>Recent notable updates include:</p>\n<ul>\n<li><a href=\"https://blog.cloudflare.com/introducing-workers-durable-objects/\">Sep 2020</a>: Maintain state with durable objects.</li>\n<li><a href=\"https://blog.cloudflare.com/introducing-cron-triggers-for-cloudflare-workers/\">Sep 2020</a>: Use a scheduler to trigger workers on a timed interval.</li>\n</ul>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>There are a lot of great options worth considering when looking for serverless computing from a cloud provider. This was a very brief introduction to some of the most popular choices, so definitely check out each provider's official documentation for more detail!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 04, 2021","updated_date":null,"description":"Traditional software development is being transformed by serverless computing. Check out the best serveless computing platforms that will assist you in getting started.","title":"Top 4 Serverless Computing Platforms in 2021","tags":["Serverless"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/d0f5b94c5c84661a08014e68b645384c/58556/cover.webp","srcSet":"/static/d0f5b94c5c84661a08014e68b645384c/61e93/cover.webp 200w,\n/static/d0f5b94c5c84661a08014e68b645384c/1f5c5/cover.webp 400w,\n/static/d0f5b94c5c84661a08014e68b645384c/58556/cover.webp 800w,\n/static/d0f5b94c5c84661a08014e68b645384c/99238/cover.webp 1200w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Andy Yeung","github":null,"avatar":null}}}},{"node":{"excerpt":"With COVID-19 forcing businesses of all sizes to move to remote working and connect with consumers online, Okta plans to leverage Auth0's…","fields":{"slug":"/identity/okta-acquires-auth0/"},"html":"<p>With COVID-19 forcing businesses of all sizes to move to remote working and connect with consumers online, Okta plans to leverage Auth0's consumer identification product to fuel growth in the $55 billion identity industry that splits as $25B for customer identity and $30B for workforce identity.</p>\n<p><em><strong>What does this acquisition imply, and why is it relevant?</strong></em></p>\n<p>For starters, this announcement reveals the dynamics of the historical and present-day scenario of the global consumer identity and access management (CIAM) market. Recent acquisition and investments show that a cloud-based customer identity platform to deliver secure digital experience and protect consumer privacy is gaining outrageous momentum.</p>\n<p>Here are some of the notable events in CIAM in recent times:</p>\n<ul>\n<li>In July 2020, Auth0 closed a <a href=\"https://www.globenewswire.com/news-release/2020/07/14/2062097/0/en/Auth0-Announces-120M-in-Series-F-Funding.html\">$120 million round of Series F funding</a>, which brought the company's valuation to $1.92 billion and total capital raised to more than $330 million.</li>\n<li>In September 2019, Denver security tech company <a href=\"https://www.bizjournals.com/denver/news/2019/09/19/denver-security-tech-company-goes-public-with-more.html#:~:text=Denver%20security%20tech%20company%20goes%20public%2C%20with%20more%20than%20%241B%20valuation&#x26;text=Denver%2Dbased%20security%20tech%20company,stock%20at%20%2415%20per%20share.\">Ping Identity went public</a> with more than $1B valuation.</li>\n<li>In January 2019, the Akamai Intelligent Edge Platform <a href=\"https://www.prnewswire.com/news-releases/akamai-completes-acquisition-of-customer-identity-access-management-company-janrain-inc-300783209.html\">acquired Janrain</a> to provide a highly-secure and resilient identity management environment for businesses and their customers.</li>\n<li>In July 2018, cloud-based CIAM platform LoginRadius announced <a href=\"https://www.loginradius.com/blog/identity/loginradius-announces-17m-series-funding-forgepoint-microsoft/\">$17M Series A Funding</a> from Microsoft's Venture Fund to accelerate its product innovation.</li>\n<li>In November 2017, SAP completed the acquisition of customer identity management firm Gigya for $350M in a smart move to strengthen its Hybris e-commerce division.</li>\n<li>In June 2016, Vista Equity Partners acquired <a href=\"https://www.pingidentity.com/en/company/press-releases-folder/2016/vista-equity-partners-to-acquire-ping-identity.html\">majority ownership of Ping Identity</a> in a leveraged buyout for $600 million.</li>\n</ul>\n<p>There were no pure-play CIAM vendors a decade ago and big players such as IBM, Oracle, Microsoft tried to extend their Employee IAM offering to customer identity use cases (which did not work). However, the newer players like Auth0, Gigya, ForgeRock, and LoginRadius have more recently driven innovation and accelerated adoption of Customer IAM technology. There's no doubt that identity is taking over as a strategic imperative for winning big in the digital economy.</p>\n<p><strong>Why are businesses investing like never before?</strong></p>\n<p>With massive penetration of smartphones, Internet and cloud, the world has gone digital and consumers expect everything online. Especially in this pandemic period, consumers have become increasingly reliant on online purchases.</p>\n<p>Brands have no choice but to build frictionless and secure digital experience for their customers while protecting their privacy. Consumers expect to access most of the services via a variety of devices and web applications, prompting businesses to invest in advanced technology that prevents cybercriminals from gaining access to sensitive information. Among security requirements include global compliances like the GDPR and CCPA. Customer IAM is emerging as foundational technology.</p>\n<p>Even analysts firms like Forrester, Gartner and KuppingerCole reported about this new and exciting category, where <a href=\"https://yaletown.com/news/loginradius-named-top-vendor-gartner-forrester/\">LoginRadius</a> has been emerging as a leading vendor, time and again. In the recent <a href=\"https://www.forrester.com/report/The+Forrester+Wave+Customer+Identity+And+Access+Management+Q4+2020/-/E-RES159083\">Forrester Wave on CIAM</a>, LoginRadius’ technology was ranked #1 above Auth0 and Okta.</p>\n<p><strong>What does the future look like?</strong></p>\n<p>Current CIAM players represent the tip of the iceberg of $25B revenue opportunity in Customer IAM space. My estimate is that less than 1.5% of this revenue opportunity is tapped so far. More importantly, the total addressable market is growing exponentially as the world gets digitized.</p>\n<p>This is an exciting phase of the IAM space particularly for the new category, Customer IAM (CIAM).</p>\n<p>I see three key trends emerging in coming years:</p>\n<ul>\n<li>Organizations stop building and maintaining customer identity systems in-house rather purchasing a cloud-based CIAM platform to save on massive spending and get faster time-to-value.</li>\n<li>In post-COVID world, the consumer-facing digital transformation will drive massive demand for CIAM.</li>\n<li>As Okta CEO Todd McKinnon said, the identity is becoming a first-class cloud category alongside infrastructure, a collaboration of enterprise software, and others.</li>\n</ul>\n<p>I’m excited for all the CIAM players.</p>\n<p>Together, let's build a world which is more secure, where privacy is protected and where consumers have delighted digital experience.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=okta-acquires-auth0\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 04, 2021","updated_date":null,"description":"Okta, a workforce identity provider, broke the news yesterday that it is buying its smaller rival Auth0 in a $6.5 billion all-stock deal—one of the blockbuster acquisition news in IAM space.","title":"CIAM Continues to Draw Attention as Okta acquires Auth0","tags":["LoginRadius"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":0.8,"src":"/static/9ba0a1dc94fe524d0ff0fcb19d33e694/3b245/loginradius-blog.webp","srcSet":"/static/9ba0a1dc94fe524d0ff0fcb19d33e694/61e93/loginradius-blog.webp 200w,\n/static/9ba0a1dc94fe524d0ff0fcb19d33e694/1f5c5/loginradius-blog.webp 400w,\n/static/9ba0a1dc94fe524d0ff0fcb19d33e694/3b245/loginradius-blog.webp 701w","sizes":"(max-width: 701px) 100vw, 701px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"Most companies turn to digital data banks to store their information. Now this information can be trivial or vital.  Trivial information…","fields":{"slug":"/identity/cloud-security-management/"},"html":"<p>Most companies turn to digital data banks to store their information. Now this information can be trivial or vital. </p>\n<p>Trivial information could refer to non-invasive information like login times and so on. But the vital information could range anywhere from phone numbers to bank statements. </p>\n<p>Therefore, providing security to these data banks is the primary reason for hiring a security team. </p>\n<p> In addition to this, people have also turned to VPN or Virtual Private Networking to prevent tracking of information as well as work with focus (SOC) partners, concentrating on information insurance. This forms the basis of cloud security. </p>\n<h2 id=\"consideration-for-cloud-security-management\" style=\"position:relative;\"><a href=\"#consideration-for-cloud-security-management\" aria-label=\"consideration for cloud security management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Consideration for Cloud Security Management</h2>\n<p>So, what is cloud security management?</p>\n<p>Security management involves the process of prioritizing information for protection. The principle that most cloud services follow is the 'incident' concept. This concept involves the team finding a breach in the security as quickly as possible. And once the breach is found, the team can then work towards patching it up. </p>\n<p>The need for enhanced cloud security is high, with over<a href=\"https://secure2.sophos.com/en-us/content/state-of-cloud-security.aspx\"> 70% of companies</a> using cloud storage having experienced a \"security incident.\" This number rises for organizations that use multiple platforms for storage. </p>\n<p> The considerations for cloud security management involve: </p>\n<ul>\n<li><strong>Prioritizing the risks</strong>: This aspect specifically applies to the companies that cannot afford to put a large number of resources into cloud security only. Therefore, they will not be able to tend to each risk simultaneously. A security management team will work towards dealing with each risk in a given order. </li>\n<li><strong>Implementing a cybersecurity culture</strong>: This implementation will be at the forefront of <a href=\"https://www.loginradius.com/blog/identity/2020/12/data-security-best-practices/\">data security</a>. It involves educating the human resources at a company about cloud security and methods to ensure security. </li>\n<li><strong>Enhancing the cloud infrastructure:</strong> This process involves safeguarding the entirety of a cloud. Therefore, all the pathways present in the cloud are secure. </li>\n</ul>\n<h2 id=\"what-are-security-management-platforms\" style=\"position:relative;\"><a href=\"#what-are-security-management-platforms\" aria-label=\"what are security management platforms permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Are Security Management Platforms</h2>\n<p>Security management platforms are designated systems that work towards providing network security to an enterprise for the storage of data that they have collected. This process involves security and compliance as well. </p>\n<p>The purpose of security management platforms are: </p>\n<ul>\n<li><strong>Simplified network visibility</strong></li>\n</ul>\n<p>The security management team makes the convoluted network of a multi-cloud system simpler. Therefore, it will be easier to detect risks. Network visibility involves visualizing the flow of traffic through a network. Therefore, it is easy to carry out the necessary cloud security measures. </p>\n<ul>\n<li><strong>Simplified security management</strong></li>\n</ul>\n<p>This aspect promises that the documentation of information belonging to an enterprise will be lucid and easy to manage. </p>\n<ul>\n<li><strong>Consistent policy enforcement</strong> </li>\n</ul>\n<p>The platform will work towards the proper implementation of policies and cloud solutions. The policies will first receive approval from the enterprise before undergoing implementation. </p>\n<ul>\n<li><strong>Automated security controls</strong></li>\n</ul>\n<p>The security controls are implemented automatically with the help of an** **artificial intelligence system. Therefore, this cuts out most hassles that come with <a href=\"https://www.loginradius.com/blog/identity/2019/10/cybersecurity-best-practices-for-enterprises/\">cybersecurity</a>. </p>\n<h2 id=\"features-of-an-ideal-security-management-platform\" style=\"position:relative;\"><a href=\"#features-of-an-ideal-security-management-platform\" aria-label=\"features of an ideal security management platform permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Features of an Ideal Security Management Platform</h2>\n<p><strong>1. Visibility on a single console</strong> </p>\n<p>Console visibility refers to the ability of a platform to create a sense of transparency between an employee at an enterprise and ongoing digital operations. Some would call this type of transparency looking through a glass pane. The purpose of this feature is to help one understand the operations at a microscopic level. This further increases the ease of implementing measures for cloud security.</p>\n<p><strong>2. Unified threat management</strong> </p>\n<p>Through this process, multiple risks or threats will undergo scrutiny simultaneously. Unified threat management works on the principle of employing the use of a single hardware or software to detect security breaches. This makes the process of detection and resolving issues very quick and easy to solve. </p>\n<p><strong>3. Real-time updates</strong> </p>\n<p>After the aforementioned scrutiny of potential risks and threats, one should be able to receive updates regarding said problems in real-time. Therefore, one will be able to be on top of not only the business operations but also the security of the enterprise. </p>\n<p><strong>4. Automation support</strong> </p>\n<p>This aspect refers to the use of artificial intelligence to detect threats and implement preventive measures. The AI can either work independently, or it can require human intervention. The functions of the AI include detecting and investigating the cloud storage of an enterprise. It would also perform functions like scheduling scans of the system as well as providing alerts. </p>\n<p><strong>5. Scalability of an enterprise</strong></p>\n<p>Security systems also work towards decreasing the workload of cloud security on an enterprise. Therefore, employing the use of this platform will mean increasing the scalability. </p>\n<p>In addition to this, a security management platform also aims to carry out various** **types of security in cloud computing like: </p>\n<ul>\n<li><strong>Presence of firewalls:</strong> These platforms will be able to hide sensitive information behind firewalls. These firewalls should be almost impossible to penetrate. </li>\n<li><strong>Protection of static data:</strong> This data should be stored in secure data banks as it is the most vulnerable to security leaks. </li>\n<li><strong>Encryption of applications:</strong> The aforementioned firewalls will need encryption in order to become almost impenetrable. This encryption can happen through passwords and secret keys. </li>\n</ul>\n<h2 id=\"what-makes-loginradius-a-trusted-security-management-platform\" style=\"position:relative;\"><a href=\"#what-makes-loginradius-a-trusted-security-management-platform\" aria-label=\"what makes loginradius a trusted security management platform permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What Makes LoginRadius a Trusted Security Management Platform</h2>\n<p>The internet houses a number of security management platforms. However, LoginRadius provides several features that work towards creating the most secure** **cloud platforms. LoginRadius provides the following cloud security features: </p>\n<p><strong>1.</strong> <strong>Handling consumer data</strong></p>\n<p>The <a href=\"https://www.loginradius.com/cloud-directory/\">LoginRadius Directory for Cloud Storage</a> is essential in creating a directory to assist a security team. This directory is exclusive to managing consumer data. The features of this cloud directory include: </p>\n<ul>\n<li><strong>Prebuilt model:</strong> The framework of this directory comes ready-made. Therefore, there is no need to invest in an experienced engineering team to build one from scratch. </li>\n<li><strong>Reduced costs:</strong> An enterprise will not have to shell out money to carry out research into a better cloud security system. </li>\n<li><strong>Automated system:</strong> All updates to the system as well as functioning is automated. </li>\n<li><strong>Compliance to privacy:</strong> The directory follows the regulations as stated in the GDPR, CCPA, and other international laws. </li>\n<li><strong>Gathering data:</strong> The directory will employ the use of open APIs to gather data from third-party resources. </li>\n<li><strong>Ownership:</strong> The enterprise that uses the platform will receive full ownership of the customer data. Therefore, they can keep firm control over the operations of the business. </li>\n</ul>\n<p><a href=\"https://www.loginradius.com/resource/cloud-security-system-sase-whitepaper\"><img src=\"/fa88a9e70426c2aaf7daf7d4265e1351/Future-proof-your-security.webp\" alt=\"Future-proof-your-security\"></a></p>\n<p><strong>2. Efficiency</strong> </p>\n<p>An enterprise will be able to access a multi-tenant cloud. This system involves the following features that are geared towards increasing the efficiency and scalability of cybersecurity. </p>\n<ul>\n<li><strong>Client databases:</strong> The information of different clients will undergo separation into different clouds to prevent confusion. </li>\n<li><strong>Logging and audit trails:</strong> Information regarding the operations of the enterprise is also tracked separately so as to increase security. </li>\n<li><strong>No evidence:</strong> Through LoginRadius' management system, one will receive the assistance of an admin console. But no third party will be able to find out about LoginRadius Identity Platform. </li>\n<li><strong>Separation of API calls:</strong> The platform can distinguish between the requests coming either from the Identity API or the Cloud Directory API. After this distinction, it further directs the requests to the respective API. </li>\n</ul>\n<p><strong>3. Adaptation</strong></p>\n<p>Through the LoginRadius Identity Platform, one will be able to receive growth-specific assistance. LoginRadius provides a list of <a href=\"https://www.loginradius.com/blog/identity/2021/01/identity-management-in-cloud-computing/\">security management standards in cloud computing</a> according to the size of the enterprise. They are:</p>\n<ul>\n<li><strong>User accommodation:</strong> The platform will be able to change in accordance with the size of the consumer base. The proper accommodation of a customer base is crucial for cloud security.</li>\n<li><strong>Increase in storage:</strong> Accommodations will also be made for the increased information that will undergo collection. </li>\n<li><strong>Handling of applications:</strong> The new applications that are created will also be logged and managed through the platform. </li>\n<li><strong>Peak load management:</strong> The login times and account activity demands will also be met with the help of the identity platform automatically. </li>\n</ul>\n<p><strong>4. Cloud Security</strong> </p>\n<p>LoginRadius provides top-notch cybersecurity through its openID connect system. This cloud security system is also known as the <a href=\"https://www.loginradius.com/\">OAuth 2.0 protocol</a> and is also used by, for example,  Google and Amazon for their data security. The** **security and compliance measures are legal and adhere to government regulations. </p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>With most business operations going online in recent years, cloud security has started to receive more importance. This is because cloud storage can get easily convoluted and complicated as the number of information increases. This makes it easy for information to be leaked. A unified cloud platform provides its services to protect information while moving to the cloud.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=cloud-security-management\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 03, 2021","updated_date":null,"description":"Security management platforms are designated systems that work towards providing network security to an enterprise for the storage of data that they have collected. This process involves security and compliance as well.","title":"Protecting a Unified Cloud Platform through Cloud Security Management","tags":["cloud security","identity management","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7699115044247788,"src":"/static/634596c333abfd4b35e4c1b5fcb5004a/58556/cloud-security-management.webp","srcSet":"/static/634596c333abfd4b35e4c1b5fcb5004a/61e93/cloud-security-management.webp 200w,\n/static/634596c333abfd4b35e4c1b5fcb5004a/1f5c5/cloud-security-management.webp 400w,\n/static/634596c333abfd4b35e4c1b5fcb5004a/58556/cloud-security-management.webp 800w,\n/static/634596c333abfd4b35e4c1b5fcb5004a/cc834/cloud-security-management.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"In the present era, people have become more reliant on technology, especially social media. Many people use different devices and platforms…","fields":{"slug":"/identity/continuous-authentication/"},"html":"<p>In the present era, people have become more reliant on technology, especially social media. Many people use different devices and platforms to remain connected with their office work and friends. Furthermore, people nowadays can also access their social and work accounts anytime and anywhere as long as they remember their login details and authenticate themselves to the system. </p>\n<h2 id=\"continuous-authentication---what-is-it\" style=\"position:relative;\"><a href=\"#continuous-authentication---what-is-it\" aria-label=\"continuous authentication   what is it permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Continuous Authentication - What is it</h2>\n<p>Continuous authentication can be regarded as a confirmation process directed at rendering identity verification and cybersecurity safeguard on an open-ended basis. This process estimates the likelihood that the discrete network users are the ones who they claim to be throughout an entire session. However, the method of continuous authentication is fairly new. </p>\n<p>Previously, we had static authentication, where the individuals just had to enter their login credentials in the system to log on to any application. The system then evaluates the entered credentials and matches those credential stuffing in the database. If the credentials match the details in the database, the system grants access to the users by successfully authenticating their credentials. However, this static content authentication has become less secure in the present times, where online frauds have become more technological. </p>\n<p>In 2018 alone, almost <a href=\"https://www150.statcan.gc.ca/n1/pub/89-28-0001/2018001/article/00015-eng.htm\">57% of Canadian internet users</a> experienced some form of a cybersecurity incident. Fast forward to pandemic-induced work-from-home months; 3 out of 10 organizations in Canada faced increased cybersecurity attacks. These increased online frauds have called for a more secure authentication process.</p>\n<p>This is where continuous authentication comes into the limelight. It has brought a novel perspective to network protection, and the response it has earned continues to illustrate the significance organizations append to their network security these days. </p>\n<p>Apart from this, continuous authentication can assist an organization in defending itself from online swindlers. They attempt to take over the online session right after when the user has finished using them. This continuous authentication further assists in securing a network from <a href=\"https://www.loginradius.com/blog/identity/phishing-for-identity/\">phishing</a> and stuffing threats. </p>\n<h2 id=\"how-continuous-authentication-operates\" style=\"position:relative;\"><a href=\"#how-continuous-authentication-operates\" aria-label=\"how continuous authentication operates permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Continuous Authentication Operates</h2>\n<p>Continuous user authentication operates based on user behavior and tries to authenticate a user based on that and has always remained an indispensable element of cybersecurity. </p>\n<p>However, with the advent of time, this authentication has grown rapidly from employing a complex password to password-less authentication for user access using methods like facial recognition, biometric authentication, and many more authentication scores. </p>\n<p>In the present times, it may seem like all these methods are also not sufficient due to the upsurging in cybercrimes, and the session imposters have become far more advanced. However, the developers have started employing continuous authentication in the network to make these methods more secure. </p>\n<p>There are numerous means that the system uses for continuous authentication. Mentioned below are some of the most common verification types that continuous authentication employs for its hassle-free operation.  </p>\n<p><strong>1. Biometric authentication</strong></p>\n<p>Biometric authentication is deemed as the most secured authentication method that a system uses. Mentioned here are some of the advantages of biometric authentication: </p>\n<ul>\n<li>Physiological features can be efficiently analyzed to authorized characteristics accumulated in a database. </li>\n<li>Physical access can also be controlled on various entrances with the help of biometric authentication. </li>\n<li>Biometric authentication can also be utilized and incorporated in two-factor authentication. </li>\n</ul>\n<p>An instance of the importance of continuous authentication using behavioral biometrics can be a situation when a user puts a two-factor authentication in their system, contemplating that this is the most secured level of authentication that they can use to protect their system. </p>\n<p>However, this two-factor authentication can also be easily hacked by the session imposters, and this is the reason why numerous reputed companies and government agencies utilize continuous authentication for a more secured network. </p>\n<p>Biometric authentication technology is utilized by numerous organizations, government, military, and other important departments that are in need of continuous authentication for protecting their networks. Some of the most common biometric and continuous authentications comprise: </p>\n<ul>\n<li><strong>Physical movement</strong></li>\n</ul>\n<p>In this kind of continuous authentication, the system can easily track the bodily movement of a user, like how a person uses their mouse pointers, the velocity of the mouse cursor, and many other factors to authenticate a user. </p>\n<p>An example of this kind of continuous authentication can be large multinational companies that employ this authentication to track the movement of their employees. </p>\n<p><a href=\"https://www.loginradius.com/resource/continuous-authentication-whitepaper\"><img src=\"/ba26e3ecbc477e901c72715c4c0e8af2/continuous-authentication-whitepaper.webp\" alt=\"continuous-authentication-whitepaper\"></a></p>\n<ul>\n<li><strong>Facial recognition</strong></li>\n</ul>\n<p>In this kind, the system saves the face of the user in the database and hence, will require facial recognition every time the user wishes to use the system interface. </p>\n<ul>\n<li><strong>Behavioural attributes</strong></li>\n</ul>\n<p>Behavioral patterns are a kind of continuous authentication method where the system identifies some behavioral traits like typing speed, finger pressure on the mouse, etc., for authenticating them.  </p>\n<ul>\n<li><strong>Voice recognition</strong></li>\n</ul>\n<p>This process is the most helpful in the case of banks or any other organization that has a lot of over-the-call interaction. This method of authentication verifies users based on their voice. </p>\n<p><strong>2. Authentication with passwords</strong></p>\n<p>Passwords are considered one of the most prevalent ways of continuous authentication. These are a combination of letters, numbers, strings or any special character that a person uses to protect their network. It is extremely important to <a href=\"https://www.loginradius.com/blog/identity/2021/01/how-to-choose-a-secure-password/\">create strong passwords</a> that use all the above-mentioned combinations to give additional security to your network. However, nowadays, these passwords have become more prone to various phishing acts as they can be easily hacked by cybercriminals. </p>\n<p>The main reason for passwords losing their effectiveness is due to the fact that many people employ similar passwords for all their accounts as they think they would not be able to remember a different password for every online account. Using similar passwords can easily help imposters hack into a system. Hence, it is advisable that people must use strong and different passwords for all their online accounts to prevent themselves from all fraudulent activities.  </p>\n<p><strong>3. Authentication based on certificate</strong></p>\n<p>In this method, the system uses digital certificates to identify its users. A digital certificate can be defined as a digital document that works as a consumer’s license to the system. It carries a key that holds the consumer’s digital signature and is only issued by a certification official. This certification-based authentication system is a more secure way of signing in to a system. </p>\n<p>The use of certificate-based continuous authentication can be seen in software development companies where there is a more threat to data and its privacy. </p>\n<p><img src=\"/550ccf2e01f3462f230c97c4f57467a7/continuous-authentication-1.webp\" alt=\"continuous-authentication-1\"></p>\n<h2 id=\"all-about-loginradius-continuous-authentication-solution\" style=\"position:relative;\"><a href=\"#all-about-loginradius-continuous-authentication-solution\" aria-label=\"all about loginradius continuous authentication solution permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>All About LoginRadius' Continuous Authentication Solution</h2>\n<p>If you are perplexed in choosing an authentication system for your networks, you can choose LoginRadius' authentication options without batting an eyelid. The continuous authentication solutions provided by LoginRadius comprises of various methods to cater to the needs of various enterprise and users that are stated below: </p>\n<ul>\n<li><strong>Smart login</strong></li>\n</ul>\n<p>In this smart login continuous authentication method provided by LoginRadius, consumers or enterprises can easily log in with a smart net server without actually logging-in to a domain for additional security. </p>\n<ul>\n<li><strong>One-touch login</strong></li>\n</ul>\n<p>The consumer is not required to enter the password every time they log on to a system with this method, subduing the threat from entering passwords multiple times.</p>\n<ul>\n<li><strong>Multi-factor authentication</strong></li>\n</ul>\n<p><a href=\"https://www.loginradius.com/blog/identity/2019/06/what-is-multi-factor-authentication/\">Multi-factor authentication</a> allows users to add various layers of protection to their data. This method requires additional authentication other than a password, including a mobile code, captcha verification, fingerprint, etc.</p>\n<ul>\n<li><strong>Social login</strong></li>\n</ul>\n<p>In this method, individuals can sign up for their work or social media accounts from a third-party website rather than logging it from their system to protect them from cybercriminals.</p>\n<p>All these <strong>authentication methods are provided by LoginRadius make the login and authentication</strong> process more effortless for your users and further assist you in creating a more solid client base and keeping your data safe and secured. The technology of authentication is constantly changing and evolving.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Many businesses have progressed ahead of password-based authentication and embraced the technology of continuous authentication to intensify the client experience on their network and keep their data secured. <a href=\"https://www.loginradius.com/blog/identity/2021/01/what-is-iam/\">Access management</a> has become easier, and also the need for remembering complex passcodes has diminished with this method. Moreover, continuous authentication systems like biometrics further prevent a data breach in the form of cybercrime. </p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=continuous-authentication\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 03, 2021","updated_date":null,"description":"Continuous authentication estimates the likelihood that the discrete network users are the ones who they claim to be throughout an entire session. However, the method of continuous authentication is fairly new and has brought a novel perspective to network protection these days.","title":"What is Continuous Authentication","tags":["continuous authentication","biometric authentication","cx"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.2738853503184713,"src":"/static/f05c4cb061bc08bb480e3d77387f26e3/58556/continuous-authentication-cover.webp","srcSet":"/static/f05c4cb061bc08bb480e3d77387f26e3/61e93/continuous-authentication-cover.webp 200w,\n/static/f05c4cb061bc08bb480e3d77387f26e3/1f5c5/continuous-authentication-cover.webp 400w,\n/static/f05c4cb061bc08bb480e3d77387f26e3/58556/continuous-authentication-cover.webp 800w,\n/static/f05c4cb061bc08bb480e3d77387f26e3/cc834/continuous-authentication-cover.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"excerpt":"Being a Quality Analyst, it's our responsibility to run test cycles on the system and push releases every two weeks to ensure the system is…","fields":{"slug":"/engineering/qa-teams-deliver-quality-software/"},"html":"<p>Being a Quality Analyst, it's our responsibility to run test cycles on the system and push releases every two weeks to ensure the system is updated with the latest fixes and everything is bug free on the live platform. Usually, every release includes amendments as well as fixes done. If we talk about the resources, the team typically has 8-10 resources, including developers and the QA team.</p>\n<p>Therefore, we should always be proactive about every release and avoid any stress during the release. Everything has to be managed properly when it comes to execution from the development end or testing from the QA end. For that purpose, we have to follow proper strategies to ensure that everything is getting tested and the release we approve met the expected quality standards.</p>\n<h2 id=\"break-away-from-the-conventional-roles-and-obligations-of-qa\" style=\"position:relative;\"><a href=\"#break-away-from-the-conventional-roles-and-obligations-of-qa\" aria-label=\"break away from the conventional roles and obligations of qa permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Break away from the conventional roles and obligations of QA</h2>\n<p>We have penetrated limits in two ways. In this day and age, we are a client confronting unit, as we get with our clients straightforwardly about their issues which they experience over the software or what are the highlights which they need to join on the stage. Also, we are actively participating in the design discussions or any inputs required from our end, which we receive from the client's end, to make sure we are going in the right direction as per the client's vision.  Our testing experience always helps detect any flaw or defects before doing any coding work, which reduces additional efforts and minimizes the work. This way, we can ensure everything is done based on the client's given timeline and a quality outcome.</p>\n<h3 id=\"opt-for-releases-very-carefully\" style=\"position:relative;\"><a href=\"#opt-for-releases-very-carefully\" aria-label=\"opt for releases very carefully permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Opt for releases very carefully</h3>\n<p>As it's impractical to test everything each time at whatever point you push any delivery. For that reason, you need to focus on the piece of code that has been chipped away. This way, you can test the primary work component without postponing things and afterward run a total test cycle to ensure no other part has been clashed by the changes. For this reason, there is a new delivery check with the group of what piece of code has been refreshed and what are the results, and generally center around that part to run tests. This way, you can focus on the work and endeavors which should be put. </p>\n<p>We center around those pieces of the code and utilize existing computerization tests to deal with different parts. If you realize something worked in the final delivery and you're not contacting it in this delivery, at that point, you don't have to invest an excessive amount of time in testing. So base your delivery standards on the new code that is being added.</p>\n<h2 id=\"always-have-a-proper-plan-based-on-priorities\" style=\"position:relative;\"><a href=\"#always-have-a-proper-plan-based-on-priorities\" aria-label=\"always have a proper plan based on priorities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Always have a proper plan based on priorities</h2>\n<p>QA has to make sure that whatever work needs to be done is appropriately prioritized. For example, if particular area of a platform is not affecting things much and can be taken care at later stage then it should be on the lowest priority; If less than one percent of our users are on a particular browser, issues specific to that browser stand out enough to be noticed.  And the area which is affecting the whole system should be done on the very first priority. There should be priorities defined like – Blocker, Emergency, Highest, High, Normal, and Low!  So always work as per the critical attention on a specific feature and consider the target user demands. What is their feedback or issues to which they want to have access? If something moved beyond clients and we find bugs, we need to fix them in the following release.</p>\n<h2 id=\"always-make-sure-to-have-proper-environments-ready\" style=\"position:relative;\"><a href=\"#always-make-sure-to-have-proper-environments-ready\" aria-label=\"always make sure to have proper environments ready permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Always make sure to have proper environments ready!</h2>\n<p>You will often hear from the development team that, \"…. It works fine with me; there must be some network issue or system issue on your end\". We have to make sure not to have such conflicts in between because, in the end, our goal has to be – Delivering bug free solution!</p>\n<p>For that purpose, Our QA and development teams run their tests in the same environment. As our builds move through the development pipeline, we should test the code under the production environment to build our staging environment to simulate our customer's production environments.</p>\n<h2 id=\"set-up-a-dedicated-performance-testing-team\" style=\"position:relative;\"><a href=\"#set-up-a-dedicated-performance-testing-team\" aria-label=\"set up a dedicated performance testing team permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Set up a dedicated performance testing team</h2>\n<p>Always plan to arrange a dedicated performance team who can run tests as soon as a product is steady and tell the team about new versions and requirements to evaluate the performance risks.</p>\n<p>To update performance teams with all the latest information and provide them with an environment close to production as you can. To make sure that there shouldn't be any gaps between and can appropriately test the product. </p>\n<h2 id=\"run-a-regression-cycle\" style=\"position:relative;\"><a href=\"#run-a-regression-cycle\" aria-label=\"run a regression cycle permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Run a regression cycle</h2>\n<p>QA team runs regression tests in the last phase of the product cycle, and it is that process that confirms the product delivery. If any of the regression tests fail, QA informs the managers/stakeholders so that appropriate actions can be taken for further release as it's never acceptable to deliver the product if any of the tests fail, which might end up in more significant problems for the team as well as the client. So the QA team always makes sure to run regression tests to verify everything properly.\nWe additionally automate our regression cycle, so it just requires a couple of days to run.</p>\n<h2 id=\"production-environment-testing-on-customer-accounts-is-necessary\" style=\"position:relative;\"><a href=\"#production-environment-testing-on-customer-accounts-is-necessary\" aria-label=\"production environment testing on customer accounts is necessary permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Production environment testing on customer accounts is necessary</h2>\n<p>As we maintain customer data in our database collections, we need to guarantee that it should remain attuned with any new versions that have been released or about to release. Whenever we release a new version, we run several updates to check that no data was harmed, and in case we find any data-corrupting bugs, those become our highest priority. We also perform manual backward compatibility testing while taking steps towards finding an automated and more efficient approach. Nonetheless, it would be best to do some manual testing, as this is one of the last stages before production.</p>\n<h2 id=\"sanity-testing-on-production-environment\" style=\"position:relative;\"><a href=\"#sanity-testing-on-production-environment\" aria-label=\"sanity testing on production environment permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Sanity testing on production environment</h2>\n<p>We perform post-release sanity tests on our production account to authorize that everything works as projected, including all third-party systems. We initially perform tests utilizing our existing production account but then create a new account to check that the process will continue to work correctly as new customers register.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>The <a href=\"https://www.loginradius.com/blog/engineering/unit-testing/\">best testing practices</a> should inculcate all other processes in general and risk management processes in particular in them. The focus should be to improve the software's overall quality while aiming to reduce the cost with continuous monitoring during and after the software release. While doing quality assurance testing, the tester should comply with all the fundamental principles and industry practices and look at the product from the end user's perspective.</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"March 01, 2021","updated_date":null,"description":"A comprehensive overview of the QA testing process is given. Learn what it takes to get top-notch testing facilities.","title":"QA Testing Process: How to Deliver Quality Software","tags":["QA","Processes","Testing"],"pinned":null,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.5037593984962405,"src":"/static/129a0973488f0d77139cfcb0f1cb61eb/ad85c/software-testing.webp","srcSet":"/static/129a0973488f0d77139cfcb0f1cb61eb/61e93/software-testing.webp 200w,\n/static/129a0973488f0d77139cfcb0f1cb61eb/1f5c5/software-testing.webp 400w,\n/static/129a0973488f0d77139cfcb0f1cb61eb/ad85c/software-testing.webp 600w","sizes":"(max-width: 600px) 100vw, 600px"}}},"author":{"id":"Neha Vyas","github":"nehavyasqa","avatar":null}}}}]},"markdownRemark":{"excerpt":"Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards…","fields":{"slug":"/identity/developer-first-identity-provider-loginradius/"},"html":"<p>Identity is evolving, and developers are at the forefront of this transformation. Every day brings a new learning—adapting to new standards and refining approaches to building secure, seamless experiences.</p>\n<p>We’re here to support developers on that journey. We know how important simplicity, efficiency, and well-structured documentation are when working with identity and access management solutions. That’s why we’ve redesigned the <a href=\"https://www.loginradius.com/\">LoginRadius website</a>—to be faster, more intuitive, and developer-first in every way.</p>\n<p>The goal? Having them spend less time searching and more time building.</p>\n<h2 id=\"whats-new-and-improved-on-the-loginradius-website\" style=\"position:relative;\"><a href=\"#whats-new-and-improved-on-the-loginradius-website\" aria-label=\"whats new and improved on the loginradius website permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What’s New and Improved on the LoginRadius Website?</h2>\n<p>LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve spent the last few months redesigning our interface— making navigation more intuitive and reassuring that essential resources are easily accessible.</p>\n<p>Here’s a closer look at what’s new and why it’s important:</p>\n<h3 id=\"a-developer-friendly-dark-theme\" style=\"position:relative;\"><a href=\"#a-developer-friendly-dark-theme\" aria-label=\"a developer friendly dark theme permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A Developer-Friendly Dark Theme</h3>\n<p><img src=\"/f46881583c7518a93bb24e94c32320de/a-developer-friendly-dark-theme.webp\" alt=\"This image shows how LoginRadius offers several authentication methods like traditional login, social login, passwordless login, passkeys and more in a dark mode.\">    </p>\n<p>Developers spend long hours working in dark-themed IDEs and terminals, so we’ve designed the LoginRadius experience to be developer-friendly and align with that preference.</p>\n<p>The new dark mode reduces eye strain, enhances readability, and provides a seamless transition between a coding environment and our platform. Our new design features a clean, modern aesthetic with a consistent color scheme and Barlow typography, ensuring better readability. High-quality graphics and icons are thoughtfully placed to enhance the content without adding visual clutter.</p>\n<p>So, whether you’re navigating our API docs or configuring authentication into your system, our improved interface will make those extended development hours more comfortable and efficient.</p>\n<h3 id=\"clear-categorization-for-loginradius-capabilities\" style=\"position:relative;\"><a href=\"#clear-categorization-for-loginradius-capabilities\" aria-label=\"clear categorization for loginradius capabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Clear Categorization for LoginRadius Capabilities</h3>\n<p><img src=\"/e5358b82be414940f3fb146013845933/capabilities.webp\" alt=\"This image shows a breakdown of all the LoginRadius CIAM capabilities, including authentication, security, UX, scalability and multi-brand management.\"></p>\n<p>We’ve restructured our website to provide a straightforward breakdown of our customer identity and access management platform capabilities, helping you quickly find what you need:</p>\n<ul>\n<li>Authentication: Easily understand <a href=\"https://www.loginradius.com/blog/identity/authentication-option-for-your-product/\">how to choose the right login method</a>, from traditional passwords and OTPs to social login, federated SSO, and passkeys with few lines of code.</li>\n<li>Security: Implement no-code security features like bot detection, IP throttling, breached password alerts, DDoS protection, and adaptive MFA to safeguard user accounts.</li>\n<li>User Experience: Leverage AI builder, hosted pages, and drag-and-drop workflows to create smooth, branded sign-up and login experiences.</li>\n<li>High Performance &#x26; Scalability: Confidently scale with sub-100ms API response times, 100% uptime, 240K+ RPS, and 28+ global data center regions.</li>\n<li>Multi-Brand Management: Efficiently manage multiple identity apps, choosing isolated or shared data stores based on your brand’s unique needs.</li>\n</ul>\n<p>This structured layout ensures you can quickly understand each capability and how it integrates into your identity ecosystem.</p>\n<h3 id=\"developer-first-navigation\" style=\"position:relative;\"><a href=\"#developer-first-navigation\" aria-label=\"developer first navigation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Developer-First Navigation</h3>\n<p><img src=\"/a8c155c2b6faf3d5f4b4de4e2b14d763/developers-menu.webp\" alt=\"This image shows the LoginRadius menu bar, highlighting the developer dropdown.\">   </p>\n<p>We’ve been analyzing developer workflows to identify how you access key resources. That’s why we redesigned our navigation with one goal in mind: to reduce clicks and make essential resources readily available.</p>\n<p>The new LoginRadius structure puts APIs, SDKs, and integration guides right at the menu bar under the Developers dropdown so you can get started faster. Our Products, Solutions, and Customer Services are also clearly categorized, helping development teams quickly find the right tools and make informed decisions.</p>\n<h3 id=\"quick-understanding-of-integration-benefits\" style=\"position:relative;\"><a href=\"#quick-understanding-of-integration-benefits\" aria-label=\"quick understanding of integration benefits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Quick Understanding of Integration Benefits</h3>\n<p><img src=\"/b2f9a964a2da0ea83e2f8596b833bba7/we-support-your-tech-stack.webp\" alt=\"This image shows a list of popular programming languages and frameworks offered by LoginRadius.\"></p>\n<p>Developers now have a clear view of the tech stack available with LoginRadius, designed to support diverse business needs.</p>\n<p>Our platform offers pre-built SDKs for Node.js, Python, Java, and more, making CIAM integration seamless across popular programming languages and frameworks.</p>\n<h2 id=\"over-to-you-now\" style=\"position:relative;\"><a href=\"#over-to-you-now\" aria-label=\"over to you now permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Over to You Now!</h2>\n<p>Check out our <a href=\"https://www.loginradius.com/\">revamped LoginRadius website</a> and see how the improved experience makes it easier to build, scale, and secure your applications.</p>\n<p>Do not forget to explore the improved navigation and API documentation, and get started with our free trial today. We’re excited to see what you’ll build with LoginRadius!</p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 21, 2025","updated_date":null,"description":"LoginRadius’ vision is to give developers a product that simplifies identity management so they can focus on building, deploying, and scaling their applications. To enhance this experience, we’ve redesigned our website interface, making navigation more intuitive and reassuring that essential resources are easily accessible.","title":"Revamped & Ready: Introducing the New Developer-First LoginRadius Website","tags":["Developer tools","API","Identity Management","User Authentication"],"pinned":true,"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.7857142857142858,"src":"/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp","srcSet":"/static/80b4e4fbe176a10a327d273504607f32/61e93/hero-section.webp 200w,\n/static/80b4e4fbe176a10a327d273504607f32/1f5c5/hero-section.webp 400w,\n/static/80b4e4fbe176a10a327d273504607f32/58556/hero-section.webp 800w,\n/static/80b4e4fbe176a10a327d273504607f32/99238/hero-section.webp 1200w,\n/static/80b4e4fbe176a10a327d273504607f32/7c22d/hero-section.webp 1600w,\n/static/80b4e4fbe176a10a327d273504607f32/1258b/hero-section.webp 2732w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},"pageContext":{"limit":6,"skip":576,"currentPage":97,"type":"///","numPages":164,"pinned":"ee8a4479-3471-53b1-bf62-d0d8dc3faaeb"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}