{"componentChunkName":"component---src-templates-tag-js","path":"/tags/public-sector/","result":{"data":{"site":{"siteMetadata":{"title":"LoginRadius Blog"}},"allMarkdownRemark":{"totalCount":8,"edges":[{"node":{"fields":{"slug":"/identity/identity-management-for-education/"},"html":"<p>Identity management for education has witnessed a dramatic change in the first half of 2020. As the COVID-19 pandemic spread, it resulted in the shutdown of educational institutes worldwide, with <a href=\"https://en.unesco.org/covid19/educationresponse\">over 1.2 billion children</a> officially out of their physical classrooms.</p>\n<p>Interestingly, there is a notable increase in e-learning from the last couple of months. Classes are conducted remotely and on digital platforms. Now, <em>that's a massive amount of traffic to keep up with.</em></p>\n<p>Because significant amounts of highly sensitive data are involved, they make profitable targets for hackers—contact details, academic records, Social Security numbers, financial information, and health data.</p>\n<p>Many educational institutions are already facing security crises and trying their best to sustain. Providing a secure learning environment has become a high priority.</p>\n<h2 id=\"recent-stats-of-cyberattack-on-students\" style=\"position:relative;\"><a href=\"#recent-stats-of-cyberattack-on-students\" aria-label=\"recent stats of cyberattack on students permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Recent Stats of Cyberattack on Students</h2>\n<ul>\n<li>According to Darktrace's study cited on Straitstimes.com, more than 100 Singapore-based customers face <a href=\"https://www.straitstimes.com/singapore/surge-in-cyberattacks-in-singapores-education-sector-in-april\">16 times more attacks</a> on the educational institution than other healthcare and retail organizations.</li>\n<li>In June 2020, hackers attacked the servers at San Francisco School of Drugs College of California. They demanded a ransom of more than $1 million USD to get back the accessibility to their data.</li>\n<li>Professional hackers breached the ed-tech platform Unacademy and <a href=\"https://in.mashable.com/tech/13837/unacademy-data-breach-data-of-nearly-22-million-users-sold-on-dark-web\">exposed 22 million user accounts</a> on the dark web. In May 2020, Cyble Inc. stumbled upon a threat actor selling the user database for $2,000. </li>\n<li>In May 2020, another online learning application based in Canada, OneClass, suffered a data breach that <a href=\"https://siliconangle.com/2020/06/29/data-belonging-1m-students-exposed-online-study-service-oneclass/\">exposed data from more than 1 million</a> students across North America.</li>\n<li>In May 2020, a Spanish e-Learning platform 8Belts suffered a data breach that affected and <a href=\"https://www.cyclonis.com/data-breach-at-8belts-affects-150000-users-worldwide/\">exposed the data of 150,000 e-learners</a> on the platform. </li>\n</ul>\n<h2 id=\"security-challenges-in-the-education-industry\" style=\"position:relative;\"><a href=\"#security-challenges-in-the-education-industry\" aria-label=\"security challenges in the education industry permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Security Challenges in the Education Industry</h2>\n<p>By now, it is pretty evident that the education sector has become a lucrative target of cybercriminals. </p>\n<p>One of the critical reasons schools are targeted, is the extensive data they maintain about students and staff, including personally identifiable information (PII), health details, and financial data. These records are a hot commodity on the dark web and are sold in millions for identity theft and fraud.</p>\n<p>Other security challenges faced by schools, universities, and colleges in the education sector include:</p>\n<h3 id=\"limited-to-no-dedicated-it-resources\" style=\"position:relative;\"><a href=\"#limited-to-no-dedicated-it-resources\" aria-label=\"limited to no dedicated it resources permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Limited to <em>no</em> dedicated IT resources</h3>\n<p>A cybersecurity challenge faced by most educational institutions when defending their networks from threats is a shortage of dedicated IT resources—possibly pointing to the lack of funds to invest in cybersecurity. </p>\n<p>Another area that could put schools at risk of attack is the legacy IT infrastructure. IT departments must ensure that older equipment and software have the most recent upgrades, or that if manufacturers no longer support them, institutes should voluntarily install new versions.</p>\n<h3 id=\"the-unsettling-byod-culture\" style=\"position:relative;\"><a href=\"#the-unsettling-byod-culture\" aria-label=\"the unsettling byod culture permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The unsettling BYOD culture</h3>\n<p>Institutes allow students to store data on their own devices, tablets, or laptops. Since they work on the same project in laboratories, in classrooms and at their residences, they carry their data on portable drives and connect to whichever computer is available. </p>\n<p>Most students don't invest in paid antivirus software or anti-malware versions. Also, they download free, pirated apps. So, every time they plug their infected USB into the institute's network, the whole system gets affected. </p>\n<p><a href=\"https://www.loginradius.com/resource/the-enterprise-buyers-guide-to-consumer-identity/\"><img src=\"/860c267222fd012ab48fe9e6c26d0129/EB-The-Enterprise-Buyer%E2%80%99s-Guide-to-Consumer-Identity.webp\" alt=\"Enterprise Buyer’s Guide to Consumer Identity Ebook\"></a></p>\n<h3 id=\"potential-open-network-vulnerabilities\" style=\"position:relative;\"><a href=\"#potential-open-network-vulnerabilities\" aria-label=\"potential open network vulnerabilities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Potential open network vulnerabilities</h3>\n<p>Many educational institutions advocate a culture of an open network for students and allow any device to connect within the premises. It is done to promote freedom of free information. </p>\n<p>But then, it has its downside too. Open network means that access is not monitored correctly, making it an easy target for cybercriminals to enter the network and wreak havoc.  </p>\n<h3 id=\"lack-of-privileged-access-management\" style=\"position:relative;\"><a href=\"#lack-of-privileged-access-management\" aria-label=\"lack of privileged access management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Lack of privileged access management</h3>\n<p>The majority of educational institutions lack a proper privileged access management system. <a href=\"https://www.loginradius.com/role-management/\">Role-based access controls (RBAC)</a> offer employees their access to different systems and data sources according to their responsibilities within the institution. </p>\n<p>Privileged accounts, like administrative accounts in schools, provide access to specific users that hold liability for critical systems and student's sensitive information.</p>\n<h3 id=\"the-ever-changing-student-lifecycle\" style=\"position:relative;\"><a href=\"#the-ever-changing-student-lifecycle\" aria-label=\"the ever changing student lifecycle permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The ever-changing student lifecycle</h3>\n<p>With each passing year, the specific role of students in the organization changes. They are promoted to the next class, some become alumni, and some may become assistants to teachers or become teachers themselves. Some students may also hold multiple responsibilities at the same time.</p>\n<p>Educational institutions should <a href=\"https://www.loginradius.com/blog/2020/06/authentication-vs-authorization-infographic/\">authenticate these new identities</a> as soon as they transition to the new role to avoid the burden of a security breach.</p>\n<h2 id=\"type-of-cyber-attacks-faced-by-the-edtech-sector-in-managing-identities\" style=\"position:relative;\"><a href=\"#type-of-cyber-attacks-faced-by-the-edtech-sector-in-managing-identities\" aria-label=\"type of cyber attacks faced by the edtech sector in managing identities permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Type of Cyber Attacks Faced by the Edtech Sector in Managing Identities</h2>\n<p>Higher educational institutes like colleges and universities store higher volumes of sensitive data related to research and other assignments. Moreover, all institutions (—for that matter) store critical alumnus, faculty, and students' data. These are gold mines for intruders to penetrate the <a href=\"https://www.loginradius.com/blog/2020/05/cyber-threats-business-risk-covid-19/\">networks and pose cyberthreats</a>. </p>\n<p>Following are a few significant ways hackers attack the Edtech sector:</p>\n<h3 id=\"spoofing\" style=\"position:relative;\"><a href=\"#spoofing\" aria-label=\"spoofing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Spoofing</h3>\n<p>A spoofing attack, in context to cybersecurity, happens when someone pretends to be someone else to gain trust to access sensitive network data and spread malware in the process. Spoofing attacks can occur in many different ways, like the widespread email spoofing attacks usually deployed as part of phishing campaigns or caller ID spoofing attacks that are also used to commit fraud. </p>\n<p>In educational institutions, attackers target IP address, Domain Name System ( DNS) servers, or Address Resolution Protocol (ARP) services.</p>\n<h3 id=\"password-hijacking\" style=\"position:relative;\"><a href=\"#password-hijacking\" aria-label=\"password hijacking permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Password Hijacking</h3>\n<p>Password hijacking, as the term suggests, is a type of attack where hackers gain unauthorized access to the user's login credentials. What's intriguing is hackers do not always adopt a highly technical and sophisticated approach to hack accounts. In many cases, they guess common phrases, such as \"qwerty,\" which ranks high on the <a href=\"https://www.loginradius.com/blog/2019/12/worst-passwords-list-2019/\">list of worst passwords</a>. </p>\n<p>The rest of the time, hackers make use of other methods like brute force attacks, dictionary attacks, credential stuffing attacks, etc. to hack into the educational institute's network.</p>\n<h3 id=\"credential-cracking\" style=\"position:relative;\"><a href=\"#credential-cracking\" aria-label=\"credential cracking permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Credential Cracking</h3>\n<p>Cracking of passwords occurs when a hacker deliberately targets a user or a business. They usually send a significant amount of time devising the right kind of attack to break into the victims' network.</p>\n<p>Speaking of which, while the victim of <a href=\"https://www.loginradius.com/blog/2019/09/prevent-credential-stuffing-attacks/\">credential cracking</a> can be any random user, the effort behind it also means that the victim has been deliberately targeted. It might be a business account, a company's social media accounts, or a premium educational institute with famous alumni.</p>\n<h3 id=\"phishing\" style=\"position:relative;\"><a href=\"#phishing\" aria-label=\"phishing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Phishing</h3>\n<p>Phishing is a malware attack that tricks victims into revealing their valuable and often sensitive data. Also referred to as a \"<a href=\"https://www.loginradius.com/blog/phishing-for-identity/\">phishing scam</a>,\" attackers target login credentials of users, financial data (such as credit cards and bank account details), business data, and everything that could be of high value to hackers. </p>\n<p>Premium educational institutions have forever been at the risk of phishing attacks, primarily because of their high-value sensitive research data, student-critical data, faculty, or alumni data.</p>\n<h3 id=\"man-in-the-middle\" style=\"position:relative;\"><a href=\"#man-in-the-middle\" aria-label=\"man in the middle permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Man-in-the-middle</h3>\n<p>A man-in-the-middle attack happens when the cybercriminal intercepts a conversation between the user and the application. You can portray it as the cyber equivalent of eavesdropping done to impersonate one of the hosts. </p>\n<p>The hacker may, in this case, plant requests that seem to come from a legitimate source. For example, ask for alumni data that is otherwise deemed confidential.</p>\n<h2 id=\"data-risk-and-vulnerabilities-in-online-education-apps-and-websites\" style=\"position:relative;\"><a href=\"#data-risk-and-vulnerabilities-in-online-education-apps-and-websites\" aria-label=\"data risk and vulnerabilities in online education apps and websites permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Data Risk and Vulnerabilities in Online Education Apps and Websites</h2>\n<p><img src=\"/999c76c855325833d6201c521f04d88e/Identity-Management-for-Education-1.webp\" alt=\"Identity-Management-for-Education\"></p>\n<p>Software applications – apps – are common on campuses nowadays. From in-class polling devices to driving university-wide learning management systems, educational institutions are swiftly adapting to the new trend. </p>\n<p>These apps and online platforms play a key role in assisting students and helping modern colleges to operate <a href=\"https://www.loginradius.com/blog/2020/06/consumer-data-privacy-security/\">smoothly by collecting data</a> from faculty and students alike.</p>\n<p>However, these data can be highly sensitive. Sometimes, they include data from students' personal preferences, their knowledge base, and projects they submit through these online portals.</p>\n<p>Therefore, there will always be a danger looming when new technologies and applications are widely implemented across campuses, and every student or lecturer is expected to use them.</p>\n<p>A lot of these educational apps may be useful. The school, college, or university faculty may use a few of those as supplemental instructional resources or advocate for additional skills practice.</p>\n<p>There is a catch, though! Newbie techies or tech start-ups build most of the new applications and courses launched with little to no background in children's privacy laws.</p>\n<p>Free apps are more likely to collect user data and monitor children's behaviors to deliver targeted advertising. Moreover, there have been instances where even paid apps were accused of monitoring and using child data for unethical purposes. They collect PII and track precise location information, creating a <a href=\"https://www.loginradius.com/blog/2019/10/cybersecurity-attacks-business/\">severe threat to privacy</a>.</p>\n<p>Then again, apps that claim to be specially designed for educational purposes are not immune either. Some of these apps make money by selling advertising directly on the platform or trading students and faculties' sensitive data such as ethnicity, affluence, religion, lifestyle, etc. to third parties.</p>\n<h2 id=\"compliance-regulations-for-the-education-sector\" style=\"position:relative;\"><a href=\"#compliance-regulations-for-the-education-sector\" aria-label=\"compliance regulations for the education sector permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Compliance Regulations for the Education Sector</h2>\n<p>With massive personal intellectual property at stake, hackers are willing to work even harder to break into educational institutions than other organizations. Failures in compliance can be extremely damaging, particularly with increased media attention.</p>\n<p>Following are a few international compliance regulations that keep students' data safe amidst the volatile criminal backdrop. </p>\n<ul>\n<li><strong>FERPA</strong>: Family Educational Rights and Privacy Act or FERPA protects the privacy of student education records. They can inspect, review their data, and if need be, they can also request amendment of their education record.</li>\n<li><strong>FOIA</strong>: The Freedom of Information Act dictates the US government agencies such as public schools, colleges, and universities to make available copies of all records requested by the student regardless of the form or format. </li>\n<li><strong>PPRA</strong>: The Protection of Pupil Rights Amendment protects the rights of minority students. Under this law, students are required to consent from parents before participating in any survey or evaluation that deals with personal data.</li>\n</ul>\n<h2 id=\"how-iam-improves-the-educational-experience-for-students\" style=\"position:relative;\"><a href=\"#how-iam-improves-the-educational-experience-for-students\" aria-label=\"how iam improves the educational experience for students permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How IAM Improves the Educational Experience for Students</h2>\n<p>The optimal digital experience for education institutions is the need of the hour. Delivering top-notch experiences to students puts the pressure on <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">customer identity and access management</a> (CIAM) providers to provide a secure platform for their data. </p>\n<p>Here how identity management for education enhances the user experience of students and faculty.</p>\n<ul>\n<li><strong>Automated access</strong>: An ideal modern IAM solution offers automated account provisioning for students, and faculty to complement their access requests, and deprovisioning needs. It eliminates the risk of human error and allows students to enjoy timely access to every resource they need. </li>\n<li><strong>Self-service capabilities</strong>: It allows both students and faculty to manage their accounts. With an IAM solution, users need not approach the help desk to solve their issues. Instead, they can have them directly resolved on their own. Examples include resetting passwords or requesting for individual access. </li>\n<li><strong>User-friendly frontend</strong>: With features like the <a href=\"https://www.loginradius.com/blog/2019/05/what-is-single-sign-on/#:~:text=Single%20Sign%2DOn%20(SSO),trustworthy%20sites%20to%20verify%20users.&#x26;text=The%20LoginRadius%20Identity%20platform%20is,management%20solutions%20with%20SSO%20solutions.\">single sign-on</a>, all applications approved by the institute are placed under one portal. Students need only to remember a single login set, and they can enjoy access to multiple applications with a single click. </li>\n<li><strong>Protect data privacy</strong>: Schools, colleges, and universities have to deal with large volumes of personal data along with other sensitive financial and sensitive data. If hacked, hackers sell these data on the dark web. An identity management solution ensures security via various means—they leverage data regulations, compliances, and <a href=\"https://www.loginradius.com/authentication/\">authentication measures</a> to cut off the bad guys at the roots. </li>\n<li><strong>Manage alumni accounts</strong>: With identity management for education in place, schools and universities can easily continue to use their accounts and keep their student email addresses active even after graduating.</li>\n</ul>\n<h2 id=\"how-higher-education-sector-can-resolve-data-security-risk-by-using-the-loginradius-identity-management-platform\" style=\"position:relative;\"><a href=\"#how-higher-education-sector-can-resolve-data-security-risk-by-using-the-loginradius-identity-management-platform\" aria-label=\"how higher education sector can resolve data security risk by using the loginradius identity management platform permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How Higher Education Sector Can Resolve Data Security Risk by Using the LoginRadius Identity Management Platform</h2>\n<p>Off late, there has been an amplified need for identity and access management in the education industry. LoginRadius, as a leading provider in its space, offers a number of a scalable, highly integrative set of tools to meet the growing requirement of the modern higher education sector. A few of the particular ones include:</p>\n<h3 id=\"new-age-onboarding\" style=\"position:relative;\"><a href=\"#new-age-onboarding\" aria-label=\"new age onboarding permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>New-age onboarding</h3>\n<p>The identity management platform allows institutes to create a central identity across all channels through single sign-on for students and faculty. It also offers modern and robust authentication methods such as <a href=\"https://www.loginradius.com/blog/2019/06/what-is-multi-factor-authentication/\">multi factor authentication (MFA)</a> with one-time passwords or security questions and more. </p>\n<p>LoginRadius allows smooth and seamless integration into systems through industry-approved standards like OpenID Connect, OAuth2, and SAML2.0. </p>\n<h3 id=\"a-clear-control-of-permissions\" style=\"position:relative;\"><a href=\"#a-clear-control-of-permissions\" aria-label=\"a clear control of permissions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>A clear control of permissions</h3>\n<p>Define the roles and permissions on who can access what content and when with LoginRadius. Colleges and universities can delegate admins to teachers, lecturers, and staff and assign their respective roles.</p>\n<p>Besides, they can work with other faculties by adding users to their groups. Also, professors can divide their students into groups and assign permissions based on their projects.</p>\n<h3 id=\"robust-api-security\" style=\"position:relative;\"><a href=\"#robust-api-security\" aria-label=\"robust api security permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Robust API security</h3>\n<p>Strengthen security and protect resources with a <a href=\"https://www.loginradius.com/identity-api/\">secure interface (APIs)</a>. It detects suspicious behavior within the system, and when the need arises demands a second factor of authentication. </p>\n<p>Furthermore, it offers excellent user experience, and with SSO on the hook, it encourages users to choose a strong password for their accounts. As a cloud-based identity management platform, LoginRadius is always updated with the latest security mechanisms.</p>\n<h3 id=\"data-compliance-management\" style=\"position:relative;\"><a href=\"#data-compliance-management\" aria-label=\"data compliance management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Data compliance management</h3>\n<p>The identity platform is compliant with all major international data regulation policies, including the <a href=\"https://www.loginradius.com/blog/identity/ccpa-vs-gdpr-the-compliance-war/\">EU's GDPR and California's CCPA</a>. To meet the high identity management of education requirements, it offers more transparency about accepted consents, secured access, and excellent user experience.</p>\n<h3 id=\"industry-specific-security-certifications\" style=\"position:relative;\"><a href=\"#industry-specific-security-certifications\" aria-label=\"industry specific security certifications permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Industry-specific security certifications</h3>\n<p>The identity management solution is compatible with <a href=\"https://www.loginradius.com/compliances/\">major security programs</a>. Major certifications include OpenID for end-user identity verification, PCI DSS PCI SSC administered standard for fee and salary transactions, ISO 27001:2013, 2015 for information security, AICPA SOC 2 (Type II) for system-level privacy control, and ISAE 3000 for the protection of non-financial information. </p>\n<p>Other certifications include ISAE 3000, NIST Cybersecurity Framework, CSA CCM Level 1, Level 2, CIS Critical Security Controls, US Privacy Shield Complaint, and ISO/IEC 27018:2019.</p>\n<h2 id=\"conclusion\" style=\"position:relative;\"><a href=\"#conclusion\" aria-label=\"conclusion permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Conclusion</h2>\n<p>Given this rapid upgrade in the classroom environment, experts are curious whether acceptance of online learning would continue to exist in the post-pandemic world, and whether such a move will affect the pressure of identity management on educational institutions.</p>\n<p>If it does (which sure, will), LoginRadius will certainly complement the complex, and unique CIAM needs for schools, colleges, and universities across the globe.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=identity-management-for-education\"><img src=\"/1bebf239d110701b9b534d7eb481a5ac/BD-Plexicon1-1024x310.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"July 08, 2020","updated_date":null,"title":"Why Identity Management for Education Sector has Become Crucial","tags":["public-sector"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/a471e5137bd738cd5336614cacab7024/176df/Identity-Management-for-Education.webp","srcSet":"/static/a471e5137bd738cd5336614cacab7024/61e93/Identity-Management-for-Education.webp 200w,\n/static/a471e5137bd738cd5336614cacab7024/1f5c5/Identity-Management-for-Education.webp 400w,\n/static/a471e5137bd738cd5336614cacab7024/176df/Identity-Management-for-Education.webp 767w","sizes":"(max-width: 767px) 100vw, 767px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"fields":{"slug":"/identity/history-human-identity-part-3/"},"html":"<p><img src=\"/16d08b92f1eb74d4d4d8f5f1bef262dc/454px-MaoriChief1784.webp\"> Sketch of a Māori chief by <a href=\"https://en.wikipedia.org/wiki/Sydney_Parkinson\">Sydney Parkinson</a> (1784) </p>\n<p>Source - <a href=\"https://commons.wikimedia.org/wiki/File:MaoriChief1784.webp\">MaoriChief1784</a></p>\n<p>In Part II of the History of Human Identity, we showed examples of identity verification such as names and unique markings. This blog is the final instalment of our 3-part series. In it, we'll focus on cultural identifiers—their use <em>and</em> their abuse.</p>\n<p>One of the oldest forms of cultural identifiers is still alive today: physical alterations. In fact, the Maori of New Zealand use <a href=\"https://brewminate.com/the-ancient-and-mysterious-history-of-tattoos/\">tattoos</a> in part as a marker of identity; the earliest recording of this dates back to the 1700s. Maori facial decorations include tattoos with detailed and stylized designs called <em>moko.</em> Moko is used to communicate information about an individual’s heritage and rank in society. </p>\n<p>In fact, the <a href=\"https://www.smithsonianmag.com/history/tattoos-144038580/\">Smithsonian.com</a> notes that the Maori use of tattoos “has accurately been described as a form of id card or passport, a kind of aesthetic bar code for the face.”</p>\n<h2 id=\"personal-identification-documents\" style=\"position:relative;\"><a href=\"#personal-identification-documents\" aria-label=\"personal identification documents permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Personal identification documents</h2>\n<p>The earliest documented account of something resembling a passport can be found in the Hebrew Bible, in the book of Nehemiah, which refers to “<a href=\"https://www.theguardian.com/travel/2006/nov/17/travelnews\">safe passage</a>” to Judah. </p>\n<p>In 1540, the granting of “<a href=\"https://www.theguardian.com/travel/2006/nov/17/travelnews\">travelling papers</a>” became the business of Britain’s Privy Council. The actual term <em>passport</em> was also recognized at that point. Some say that the term reflects the act of passing through maritime ports, although that is up for debate.</p>\n<p><strong>Charles de Saint-Mémin’s United States passport, June 30, 1810</strong></p>\n<p><img src=\"/a35460ca5646f3468ec9d5dcf374f9dd/image-2.webp\" alt=\"human identity \"> Charles de Saint-Mémin’s United States passport, June 30, 1810 </p>\n<p>Source - <a href=\"https://www.metmuseum.org/art/collection/search/656327\">metmuseum</a></p>\n<p>A passport is also a form of personal identification that indicates national identity.</p>\n<p>Around 100 countries now have compulsory <a href=\"https://en.wikipedia.org/wiki/List_of_national_identity_card_policies_by_country\">national identity cards</a>. Another 28 countries have optional national identity cards, but their citizens often use other forms of ID such as passports or driving licenses. </p>\n<p><a href=\"https://en.wikipedia.org/wiki/West_Germany\"><strong>West German</strong></a> <strong>identity card issued between 1 January 1951 and 31 March 1987</strong></p>\n<p><img src=\"/c797e76a085fb3e7e3420d86a5147b48/image-3.webp\" alt=\"human identity\"> <a href=\"https://en.wikipedia.org/wiki/West_Germany\">West German</a> identity card issued between 1 January 1951 and 31 March 1987 </p>\n<p>Source - <a href=\"https://commons.wikimedia.org/wiki/File:1979_identity_card_of_West_Germany_original_size.webp\">West German Identity Card</a></p>\n<p>A Social Security number (SSN) is another unique identifier. The US  government assigned this for taxation and benefits. Issued by the US Social Security Administration in November 1935, SSN numbers were part of the New Deal Social Security program. Today, US citizens still use SSNs to access benefits, pay taxes, receive wages, and show one’s identity.</p>\n<p><strong>A Social Security card issued by the</strong> <a href=\"https://en.wikipedia.org/wiki/Railroad_Retirement_Board\"><strong>Railroad Retirement Board</strong></a> <strong>in 1943 to a now-deceased person.</strong></p>\n<p><img src=\"/68a2496348bc67706bf652806fe5cb4a/image-4.webp\" alt=\"human identity\"> A Social Security card issued by the <a href=\"https://en.wikipedia.org/wiki/Railroad_Retirement_Board\">Railroad Retirement Board</a> in 1943 to a now deceased person. </p>\n<p>Source - <a href=\"https://commons.wikimedia.org/wiki/File:PD_social_security_card.webp\">Social Security Card</a></p>\n<p>A Social Insurance Number (SIN) is a 9-digit form of identification that every individual residing and/or working in Canada must have in order to access government benefits, file income taxes, and legally receive payment. <a href=\"https://blog.wagepoint.com/all-content/the-complete-history-of-the-social-insurance-number\">SIN cards were first issued in 1964</a> but have not been printed as cards since 2014 due to the risk of theft. Today, Canadian citizens do not carry SIN cards on their person.</p>\n<h2 id=\"name-changes\" style=\"position:relative;\"><a href=\"#name-changes\" aria-label=\"name changes permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Name changes</h2>\n<p>Many countries have a process for officially changing one’s legal name. </p>\n<p>In Western society, some marriage partners decide to change their surnames. However, taking a new surname is not as commonplace as it once was. In fact, sometimes men and women change both of their surnames to a hyphenated or a combined version of the two. </p>\n<p>A name change can pose issues for your personal identity, including <a href=\"https://www.healthyway.com/content/heres-why-changing-your-name-when-you-get-married-can-actually-be-a-terrible-idea/\">losing your professional identity or brand.</a> </p>\n<p>As a rule, US citizens who wish to change their surnames after marriage must endure a lengthy process. Here's what they must do:</p>\n<ul>\n<li>After you get a copy of your marriage license, you must visit the Social Security Administration online or in person.</li>\n<li>From there, you fill out the necessary paperwork and show proof of your US citizenship (for example, a birth certificate, passport, or a photo ID like a driver’s license). </li>\n<li>Once you receive your new social security card (new name, same number), you can change your driver’s license. This change also requires two forms of identification, proof of address, and a certified copy of your marriage license.</li>\n<li>With your new official identification in hand, you can change your name on your banking information, utility bills, and credit cards.</li>\n</ul>\n<h2 id=\"personal-vs-legal-identification\" style=\"position:relative;\"><a href=\"#personal-vs-legal-identification\" aria-label=\"personal vs legal identification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Personal vs. legal identification</h2>\n<p>As governments began to regulate identity verification, conflicts arose between personal and legal identification. The ways that people identify themselves sometimes clash with the ways that governments want to identify them.</p>\n<p>For example, Canada has a controversial history when it comes to identifying Inuit communities. In the 1930s, a personal identification program in the Canadian Arctic <a href=\"https://www.thecanadianencyclopedia.ca/en/article/project-surname\">required Inuit fingerprints</a> to identify and document Inuit communities. Shortly after, missionaries and federal agents successfully halted the program, due to the association of fingerprinting with criminal activity. </p>\n<p>It took roughly 10 years for the Canadian government to approve and implement a substitute identification system for Canada’s Northern Territories. This was known as the <a href=\"https://www.vice.com/en_ca/article/xd7ka4/the-little-known-history-of-how-the-canadian-government-made-inuit-wear-eskimo-tags\">personal identification disk system</a>. The government required Inuit people to wear these small, numbered disks at all times. As a result, many complained that these looked and felt like dog tags. Due to public outcry, the government ceased the program in the 1970s (1980s in Quebec). And in its place, they created a new program called Project Surname.</p>\n<p><strong>Public domain photo: Inupiat family, 1929</strong></p>\n<p><img src=\"/2a39730a34121f10a8204ce8a2ca6735/image-5.webp\" alt=\"human identity\"> Public domain photo: Inupiat family, 1929 </p>\n<p>Source - <a href=\"https://commons.wikimedia.org/wiki/File:Inupiat_Family_from_Noatak,_Alaska,_1929,_Edward_S._Curtis_(restored).webp\">Inupiat Family</a></p>\n<h2 id=\"project-surname\" style=\"position:relative;\"><a href=\"#project-surname\" aria-label=\"project surname permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Project Surname</h2>\n<p>In the 1940s the Canadian government created Project Surname as a way to identify the Inuit population. Instead of a number, Project Surname assigned Anglicized last names to Inuit peoples in northern Canada. </p>\n<p>While some Inuit and non-Inuit peoples viewed Project Surname as an effective new identification system, others saw it as a demeaning act of paternalism. </p>\n<p>In essence, it stripped people of a meaningful and spiritual tradition. </p>\n<p>Before the arrival of Europeans, the <a href=\"https://www.thecanadianencyclopedia.ca/en/article/inuit/\">Inuit</a> used a complex naming tradition that reflected their culture, environment, animals, family, and spirits. Today, Inuit surnames may contain both Euro-Canadian and traditional Inuit names. However, <a href=\"https://acresofsnow.ca/canadas-mandatory-eskimo-identification-tags/\">the sting of Project Surname remains</a>, demonstrating what happens when legal identification gets <em>too</em> personal.</p>\n<p>As cofounder and CTO of LoginRadius, a customer identity and access management solution, I enjoy researching and writing about cultural identifiers. Likewise, I hope that you enjoyed this History of Human Identity series and will return to read our next series.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=history-human-identity-part-3\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"September 04, 2019","updated_date":null,"title":"A History of Human Identity in Pictures Part 3","tags":["public-sector"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/27a047d3678bcbcd5a2ddaf7c6594e38/c0524/history-human-identity-part-3.webp","srcSet":"/static/27a047d3678bcbcd5a2ddaf7c6594e38/61e93/history-human-identity-part-3.webp 200w,\n/static/27a047d3678bcbcd5a2ddaf7c6594e38/1f5c5/history-human-identity-part-3.webp 400w,\n/static/27a047d3678bcbcd5a2ddaf7c6594e38/c0524/history-human-identity-part-3.webp 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"fields":{"slug":"/identity/history-identity-part-2/"},"html":"<p>In Part I of The History of Identity, we covered how identity began in ancient times. For Part II, we focus on current times, where personal names are now considered fundamental to identity and dignity. </p>\n<h2 id=\"the-emergence-of-family-names\" style=\"position:relative;\"><a href=\"#the-emergence-of-family-names\" aria-label=\"the emergence of family names permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The emergence of family names</h2>\n<p>The United Nations Convention on the Rights of the Child declares that every child “shall be registered immediately after birth and shall have the right from birth to a name.” Family names or surnames identify a person’s origins. Family names appear to have developed first in China, originally among the nobility, and then spread to commoners.</p>\n<p>Clan names that seem to indicate matrilineal heritage, called <em>xìng</em> (姓), emerged in China around 4000–3000 BC. Many of these names include the character for woman (女), and the character for <em>xìng</em> reads as “born of a woman.” People with the same <em>xìng</em> were not allowed to marry each other.</p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:Lacquer_painting_from_Ch%27u_State.webp\"><img src=\"/63c709cafb2a20c7ea84755f7b9c6cf7/image-1.webp\" alt=\"Human Identity\"></a></p>\n<p><strong>Lacquer painting from State of Ch'u (704–223 BC)</strong></p>\n<p>Another type of clan name appeared during the Zhou dynasty from 1046–256 BC. As society became more complex and patrilineal, the <em>shì</em> name (氏) allowed people to differentiate themselves from others with the same <em>xìng</em>.</p>\n<p>A person’s <em>shì</em> name might be derived from their state or fiefdom, their position within their family, or their profession.</p>\n<p>Chinese surnames were standardized in 221 BC under the first emperor of the Qin dynasty. The <em>xìng</em> and <em>shì</em> names, which people had been using interchangeably, were merged into the single concept of a family name.</p>\n<p><a href=\"https://www.metmuseum.org/art/collection/search/248783\"><img src=\"/b9a5e9d1e68049de984bd849b828464e/image-2.webp\" alt=\"Human Identity\"></a></p>\n<p><strong>Marble portrait of the co-emperor Lucius Verus (130 - 169 AD).</strong> <strong>His name at birth was Lucius Ceionius Commodus, changed to Lucius Aelius Aurelius Commodus when he was adopted.</strong></p>\n<p>Family names first evolved in the Western world during the time of the Roman Empire, 750 BC to 500 AD. Romans developed <a href=\"https://heraldry.sca.org/names/roman.html\">a system of <em>tria</em> <em>nomina</em></a> (“three names”):</p>\n<ul>\n<li><em>Praenomen</em> (given name)—a personal name chosen by a child’s parents. Praenomen had standard abbreviations. i.e. Tiberius, abbreviated as Ti.</li>\n<li><em>Nomen</em> (clan name)—a public name that indicated social status, i.e. Valerius.</li>\n<li><em>Cognomen</em> (nickname)—a name describing physical or moral characteristic, i.e. Rufus, meaning “red-haired.”</li>\n</ul>\n<p>The Roman three-name system started with the aristocracy and spread to the general citizenry as the population grew and people needed more names to distinguish among themselves.</p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:Jon_Ogmundsson_Icelandic_bishop.webp\"><img src=\"/ea78db67537cc7169d7830c6894b2afe/image-3.webp\" alt=\"Human Identity\"></a></p>\n<p><strong>Bishop</strong> <a href=\"https://commons.wikimedia.org/w/index.php?title=J%C3%B3n_%C3%96gmundsson&#x26;action=edit&#x26;redlink=1\"><strong>Jón Ögmundsson</strong></a> <strong>of Hólar, from the 19th century Icelandic manuscript JS 629 4to, now in the care of the Icelandic National Library</strong></p>\n<p>Surnames developed in the rest of Europe starting in the 11th century. Norman barons brought them to England after the invasion of 1066. Most of these surnames grew organically from one of the following characteristics.</p>\n<p><strong>Lineage</strong>: <em>Patronymic</em> and <em>matronymic</em> surnames originate from a father or mother’s name.</p>\n<p>Iceland developed a system where children receive a new surname based on their father’s name (or occasionally mother’s name). For example, Iceland's current prime minister is Jóhanna Sigurðardóttir. Her father’s name is Sigurður, so her surname becomes Sigurðardóttir, meaning “daughter of Sigurður.”</p>\n<p><a href=\"https://www.english-heritage.org.uk/learn/story-of-england/early-medieval/architecture/\"><img src=\"/85b92d739394b1f811948efc986a962e/image-4.webp\" alt=\"Human Identity\"></a></p>\n<p><strong>Part of Offa’s Dyke, an 8th-century earthwork boundary in Britain.</strong></p>\n<p><strong>Location</strong>: Many Anglophone names come from the names of towns or regions (Hamilton, Murray), local topology (Landon means “long hill”), or features (Dyke, Wood, Fields).</p>\n<p><a href=\"https://hausbuecher.nuernberg.de/75-Amb-2-279-81-v/data\"><img src=\"/dd2cb534a0c60e5956d4babb28e75e51/image-5.webp\" alt=\"Human Identity\"></a></p>\n<p><strong>A German tailor pictured in die Nürnberger Hausbücher, 1612.</strong></p>\n<p><strong>Profession</strong>: <a href=\"https://en.wikipedia.org/wiki/Surname#Occupational_surname\">Occupational names</a> are based on the work performed by that family. The German name Eisenhauer means “iron hewer,” Schneider means “tailor,” and Schmidt refers to a blacksmith. Occupational names were also taken by servants of masters in certain professions. There is speculation, for example, that the English surname Vickers would have been adopted by the servant of a vicar.</p>\n<h2 id=\"additional-names\" style=\"position:relative;\"><a href=\"#additional-names\" aria-label=\"additional names permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Additional names</h2>\n<p><a href=\"https://www.rd.com/culture/why-do-we-have-middle-names/\">Middle names</a> have their origins in social class and religion. As mentioned earlier, more names indicated more respect during Roman times. Men had three names; women had two; their slaves had one. </p>\n<p>Aristocrats considered long names a show of their high place in society. Spanish and Arabic families would give their children paternal or maternal names from previous generations. This practice allowed them to keep track of the child’s family tree. </p>\n<p><a href=\"https://www.metmuseum.org/art/collection/search/451286?&#x26;searchField=All&#x26;sortBy=Relevance&#x26;when=A.D.+1600-1800&#x26;ft=royal+name&#x26;offset=0&#x26;rpp=20&#x26;pos=1\"><img src=\"/1d753d9933dc937e91f1857dda850c1e/image-6.webp\" alt=\"Human Identity\"></a></p>\n<p><strong>\"Rosette Bearing the Names and Titles of Shah Jahan,\" ca. 1645. The central inscription reads, “His Majesty Shihab al-Din Muhammad Shah Jahan, the king, the vanquisher, may God perpetuate his dominion and sovereignty.”</strong></p>\n<p>This tradition of middle names spread across Western cultures in the 1700s. But this time, three names were not exclusive to men. When faced with choosing between a family name and a saint name for their children, Europeans decided to go with both: given name first, baptismal (saint) name second, and surname third. The practice then spread to America through immigration.</p>\n<p>Today, many cultures use a beloved relative’s name for a child’s middle name. And some families may even have two middle names to reflect both maternal and paternal relatives. Practically speaking, middle names can help differentiate people who share common first and last names. For this reason, <a href=\"https://www.businessinsider.com/why-you-cant-board-flights-if-your-middle-name-isnt-on-your-ticket-2018-4\">middle names may be required</a> on important documents, such as flight tickets.</p>\n<h2 id=\"the-order-of-names\" style=\"position:relative;\"><a href=\"#the-order-of-names\" aria-label=\"the order of names permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The order of names</h2>\n<p>The <a href=\"https://en.wikipedia.org/wiki/Personal_name#Name_order\">placement of surnames</a>, or family names, varies by country. </p>\n<p>Eastern name order is typical in East Asia, South Asia, Southeast Asia, and parts of India.</p>\n<p>The convention in China is to have the family name appear first, followed by the given name. For example, Gāo Xíngjiàn (高行健), who won the Nobel Prize for Literature in 2000, has the family name Gāo and the given name Xíngjiàn.</p>\n<p>Western name order is common throughout Europe, the Americas, Australia, and New Zealand. The given name comes first, and then the family name, although for alphabetized lists, the names are reversed and separated by a comma. </p>\n<p>When Eastern names are used in the West and vice versa, there can be some confusion about whether they are following their traditional name order or not. The cellist known as Yo-Yo Ma uses the Western ordering, even though his Chinese name is Ma Youyou (马友友). </p>\n<h2 id=\"identity-verification\" style=\"position:relative;\"><a href=\"#identity-verification\" aria-label=\"identity verification permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identity verification</h2>\n<p>The need to confirm someone’s identity also goes back to ancient times. As society grew larger and political and financial systems developed, humans created ways to verify that a person’s identity was valid.</p>\n<p>Some civilizations developed stamps and seals that represented a person’s identity. </p>\n<p><a href=\"https://www.metmuseum.org/art/collection/search/321391?&#x26;searchField=All&#x26;sortBy=Relevance&#x26;ft=cylinder+seal&#x26;offset=0&#x26;rpp=20&#x26;pos=14\"><img src=\"/541e015d2aa0f00219ab27bc579f2746/image-7.webp\" alt=\"Human Identity\"></a></p>\n<p><strong>Modern impression of a Cypriot cylinder seal: female figure, ibex, lion, ca. 14th–13th century B.C.</strong></p>\n<p>Cylinder seals go back to the fourth millennium BC in Mesopotamia. These <a href=\"https://www.historyonthenet.com/mesopotamian-cylinder-seals\">carved cylinders</a> were rolled across wet clay to create an impression that signified ownership or identity. The seals were sometimes crafted from semi-precious stone such as carnelian or lapis lazuli and worn as jewellery. They were used by people from all strata of society to sign business deals, treaties, and marriage contracts.</p>\n<p>The earliest seals in China originated during the Shang Dynasty, 1600 to 1046 BC. Chinese seals known as <a href=\"https://www.thoughtco.com/chinese-chops-seals-2278409\">chops</a> were carved from jade, stone, or ivory and dipped in red paste to stamp a unique symbol on documents, letters, and artwork.</p>\n<p><a href=\"https://nl.wikipedia.org/wiki/Bestand:Chinese_seal_(Han_Dynasty).webp#/media/Bestand:Chinese_seal_(Han_Dynasty).webp\"><img src=\"/6d7ce49f9f8c9c52baf9b7b172dc95a6/Chinese_seal_Han_Dynasty.webp\" alt=\"Human Identity\"></a></p>\n<p><strong>Chinese seal with Han and Manchu characters</strong> </p>\n<p>Other types of signature seals can also be found across East Asia. In Japan, signature ink stamps are called <a href=\"https://www.nippon.com/en/features/jg00077/hanko-and-inkan-japanese-stamps-and-personal-seals.html\"><em>hanko</em></a>. These are commonly accepted as a signature when validating documents and official forms. Hanko stamps can be made from wood, plastic, and other materials and again, the ink, is generally red.</p>\n<p>In the 5th century BC, the Romans started to write sentences and names at the bottom of documents, in addition to creating wax seals with <a href=\"https://www.thehistorypress.co.uk/articles/a-brief-history-of-signet-rings/\">signet rings</a>. The earliest surviving signature from a famous historical figure is that of Rodrigo Díaz de Vivar, a medieval Spanish nobleman known as El Cid, dated to 1098. </p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:Signature_of_El_Cid.webp\"><img src=\"223px-Signature_of_El_Cid.webp_.webp\"></a></p>\n<p><strong>Autograph signature of Rodrigo Díaz, [also] called El Cid, Archive of the Cathedral of Salamanca.</strong> <strong>It reads in Latin: ego ruderico, \"I, Rodrigo\".</strong></p>\n<p>To see how modern society uses and abuses identity, be sure to read Part III of our History of Human Identity series next week.</p>\n<p>Learn how to create a unified digital identity for all of your customers. <a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=history-identity-part-2\">Book a demo</a> today with LoginRadius.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=history-identity-part-2\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 20, 2019","updated_date":null,"title":"A History of Human Identity in Pictures  Part 2","tags":["public-sector"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/4bab77ebce2317c97b81926bfdde93a6/c0524/history-identity-part-2.webp","srcSet":"/static/4bab77ebce2317c97b81926bfdde93a6/61e93/history-identity-part-2.webp 200w,\n/static/4bab77ebce2317c97b81926bfdde93a6/1f5c5/history-identity-part-2.webp 400w,\n/static/4bab77ebce2317c97b81926bfdde93a6/c0524/history-identity-part-2.webp 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"fields":{"slug":"/identity/history-identity-part-1/"},"html":"<p><img src=\"/499c0cfb01fff9f826629127fc04da46/image-1.webp\" alt=\"human identity\"> Portrait of Thakur Utham Ram, ca. 1760 </p>\n<p>Source - <a href=\"https://www.metmuseum.org/art/collection/search/37876\">metmuseum</a></p>\n<p>The concept of human identity stretches back thousands of years into unrecorded history. </p>\n<p>Long before our identities were digitized and stored in databases, we used language, objects, and documents to represent and confirm our individuality.</p>\n<p>This pictorial history in 3 parts explores all the creative ways that we’ve developed to identify ourselves and each other over the millennia. </p>\n<h2 id=\"prehistoric-identity\" style=\"position:relative;\"><a href=\"#prehistoric-identity\" aria-label=\"prehistoric identity permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Prehistoric identity</h2>\n<p>It’s impossible to know when humans first recognized that they had individual identities.</p>\n<p>We assume that early hominins knew each other by sight, sound, smell, and touch, as animals do. </p>\n<p><img src=\"/7479ec6c6f774efbcd8508d42ebfe9c9/image-2.webp\" alt=\"human identity\"> High school students in Binghamton NY, USA, holding replicas of hominin skulls. Photo by Carolyn WIlczynski </p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:Students_explore_hominid_evolution.webp\">Students explore hominid evolution</a></p>\n<p>Presumably they could tell one Neanderthal from another by their faces, the noises they made, and the way they moved. </p>\n<p>There is even <a href=\"https://www.nature.com/articles/ncomms5800\">research</a> showing that human faces evolved in ways that made it easier for humans to recognize each other. The fact that facial recognition was supported by natural selection implies that it’s very important for social interaction and the success of the species. </p>\n<p><img src=\"/038c61e7148e2d901d3706d730a71c3f/image-3.webp\" alt=\"human identity \"> Hands, ca. 7300 BC, at the Cuevas de las Manos upon Río Pinturas, Argentina. Photo by Mariano Cecowski </p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:SantaCruz-CuevaManos-P2210651b.webp\">SantaCruz-CuevaManos-P2210651b</a></p>\n<p>For an example of written identity in prehistory, we can look at cave markings showing stencilled handprints. Archeologists disagree on the meaning behind cave handprints—they could be warning messages or part of shamanic practice—but to our modern eyes they look like signatures or graffiti tags, a way of saying, “I was here.” </p>\n<p><img src=\"/d4ab7373de245ee439788583b118900d/image-4.webp\" alt=\"human identity\"> Forensic reconstruction of Oase 2 skull dating to 35,000 BC </p>\n<p><a href=\"https://commons.wikimedia.org/wiki/File:Neanderthaler,_Oase,_Rum%C3%A4nien_(Daniela_Hitzemann).webp\">Homo sapiens sapiens, Oase, Rumänien (Daniela Hitzemann)</a></p>\n<p>Spoken language emerged 100,000 years ago. In fact, the structure of the brain and the size of the spinal cord of Cro-Magnon people suggests that they would have been capable of producing the <a href=\"https://australianmuseum.net.au/learn/science/human-evolution/how-do-we-know-if-they-could-speak/\">same sounds that we use in speech today</a>.</p>\n<p>But since we’ve only been writing for the last 6,000 years, we’ll never know if Cro-Magnons  developed names for one another, or if so, how these were chosen. </p>\n<h2 id=\"the-first-recorded-names\" style=\"position:relative;\"><a href=\"#the-first-recorded-names\" aria-label=\"the first recorded names permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The first recorded names</h2>\n<p>The earliest known names go back to the dawn of ancient history, around 3000 BC. These were the names of royalty passed down through oral history and written down much later: <a href=\"https://en.wikipedia.org/wiki/Alulim\">Alulim, first king of Sumer</a>, and <a href=\"https://en.wikipedia.org/wiki/Narmer\">Narmer, an ancient Egyptian pharaoh</a>.</p>\n<p>The oldest artifacts with written names have more everyday origins. </p>\n<p>There are several candidates for the distinction of first recorded name. </p>\n<p><img src=\"/825deb1a4626c7afea9d1c7841665640/image-5.webp\" alt=\"human identity\"> A photo of the Kushim Tablet. © <a href=\"https://www.schoyencollection.com/24-smaller-collections/wine-beer/ms-1717-beer-inanna-uruk\">The Schøyen Collection, Oslo and London</a> </p>\n<p><a href=\"https://www.ancient-origins.net/artifacts-ancient-writings/leaving-mark-history-oldest-known-named-person-007882\">Leaving A Mark in History: The Oldest Known Named Person</a></p>\n<p>One is a Mesopotamian clay tablet, ca. 3100 BC, found in Iran that appears to document a business transaction. The receipt for barley delivery to the brewery at Inanna Temple is presumably signed with the name of Kushim, an accountant or record keeper.</p>\n<p>[caption id=\"attachment_5348\" align=\"aligncenter\" width=\"1684\"]<img src=\"https://www.loginradius.com/blog/wp-content/uploads/sites/4/2019/08/pic5.webp\" alt=\"human identity\"> Jamdat Nasr administrative tablet, ca. 3100-2900 BC. Image copyright © The Metropolitan Museum of Art <a href=\"https://www.metmuseum.org/toah/works-of-art/1988.433.1/\">metmuseum</a></p>\n<p>The second is another Mesopotamian tablet from the same era that bears the name of a slaveholder, Gal-Sal, and two slaves, En-pap X and Sukkalgir.</p>\n<h2 id=\"the-origins-of-personal-names\" style=\"position:relative;\"><a href=\"#the-origins-of-personal-names\" aria-label=\"the origins of personal names permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>The origins of personal names</h2>\n<p><img src=\"/eca137243e6c8edab906e998bf53de49/image-6.webp\" alt=\"human identity\"> A Machiguenga woman dressed in traditional garb <a href=\"https://commons.wikimedia.org/wiki/File:Machiguenga_woman.webp\">Machiguenga woman</a></p>\n<p>Almost every known society refers to individuals by a fixed personal name, but there are some exceptions. One is the Machiguenga of the Amazon, a small tribe that refers to others by their kin relationship, such as “sister.”</p>\n<p>Ancient cultures generally used single names, what we might now consider a first name or given name. Single names are also called <em>mononyms</em>. </p>\n<p><img src=\"/e04146471a786da84dca8e6f6f68133f/image-7.webp\" alt=\"human identity\"> Dead Sea Scroll, part of Isaiah Scroll (Isa 57:17 - 59:9), ca. 100 BC <a href=\"https://commons.wikimedia.org/wiki/File:1QIsa_b.webp\">Dead Sea Scroll</a></p>\n<p>Most Biblical names are mononyms, for example. This fragment of the Hebrew Bible contains the name יַעֲקֹב (Jacob). </p>\n<p>Both the Hebrew and Christian scriptures give great significance to names within the narrative. The meanings of names are often described in the text: The man called his wife Eve [which probably means “living”] because she would be the mother of all the living.” People sometimes take or receive new names to indicate a change in their identity, such as when God renames Abram and Sarai to Abraham and Sarah as part of a promise to make them a great nation.</p>\n<p><img src=\"/f7dd0c103beb3fc46feb44d0afd569a9/image-8.webp\" alt=\"human identity\"> Zeno of Citium. Bust in the Farnese collection, Naples. Photo by Paolo Monti, 1969 <a href=\"https://commons.wikimedia.org/wiki/File:Paolo_Monti_-_Servizio_fotografico_(Napoli,_1969)_-_BEIC_6353768.webp\">Paolo Monti</a></p>\n<p>The ancient Greeks used mononyms as well, although historians added qualifiers called <em>epithets</em> when they needed to distinguish between two people with the same name. Epithets might be descriptive of the person or refer to their home or ancestry, but they are not considered part of their official name. For example, we have Zeno the Stoic (also known as Zeno of Citium) and Zeno of Elea.</p>\n<p>For a history of identity in the modern world, read Part II of this series next week. </p>\n<p><img src=\"/097b03db8ae840e524586576d4956c6d/image-9.webp\" alt=\"human identity\"> A newborn’s hospital name tag </p>\n<p><a href=\"https://pixabay.com/photos/baby-medicine-child-foot-care-3169975/\">Pixabay</a></p>\n<p>Learn how to create a unified digital identity for all of your customers. <a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=history-identity-part-1\">Book a demo</a> today with LoginRadius.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=history-identity-part-1\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"August 07, 2019","updated_date":null,"title":"A History of Human Identity in Pictures - Part 1","tags":["public-sector"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/36ae89aa2233f3d7f6e12fed38a77825/c0524/history-identity-part-1.webp","srcSet":"/static/36ae89aa2233f3d7f6e12fed38a77825/61e93/history-identity-part-1.webp 200w,\n/static/36ae89aa2233f3d7f6e12fed38a77825/1f5c5/history-identity-part-1.webp 400w,\n/static/36ae89aa2233f3d7f6e12fed38a77825/c0524/history-identity-part-1.webp 769w","sizes":"(max-width: 769px) 100vw, 769px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"fields":{"slug":"/identity/best-janrain-alternative/"},"html":"<p>In January of 2019, Akamai acquired Janrain and rebranded their <a href=\"https://www.loginradius.com/blog/2019/06/customer-identity-and-access-management/\">CIAM solution</a> as “Identity Cloud,” a platform designed to improve security access controls and identity management. Before the purchase price was revealed, Forrester predicted it would be in the $250M–$275M range (based on an estimation of Janrain’s annual revenue). In reality, the sale price was <a href=\"https://www.bizjournals.com/portland/news/2019/03/01/that-sale-price-for-janrain-125.html\">$125M</a>—<em>roughly half of Forrester’s estimate</em>. Since then, perhaps in response to the Janrain acquisition, customers have reached out to LoginRadius seeking a Janrain alternative. Here’s what they told us. </p>\n<h2 id=\"why-customers-want-a-janrain-alternative\" style=\"position:relative;\"><a href=\"#why-customers-want-a-janrain-alternative\" aria-label=\"why customers want a janrain alternative permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Why customers want a Janrain alternative</strong></h2>\n<p>LoginRadius has had many conversations with current and former Janrain customers in the last few months. Through these discussions, we’ve learned that the Janrain acquisition is playing out in a similar fashion to the Gigya acquisition. If you’re interested in reading about the pitfalls of the Gigya/SAP merger, you might like our article <a href=\"https://www.loginradius.com/blog/2019/02/looking-gigya-alternative-try-loginradius-superior-modern-identity-platform/\">Looking for a Gigya Alternative?</a>. In it, we explain some of the problems arising from the Gigya/SAP merger. </p>\n<p>Likewise, in this article, I’ll demonstrate that while mergers and acquisitions (M&#x26;A) can be exciting, an acquisition may sometimes be damaging for customers, partners, and employees. To illustrate that, here are some of the reasons customers are seeking a Janrain alternative today.</p>\n<h2 id=\"recent-janrainakamai-complaints\" style=\"position:relative;\"><a href=\"#recent-janrainakamai-complaints\" aria-label=\"recent janrainakamai complaints permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Recent Janrain/Akamai complaints</strong></h2>\n<h3 id=\"we-lost-the-freedom-to-use-our-existing-stack\" style=\"position:relative;\"><a href=\"#we-lost-the-freedom-to-use-our-existing-stack\" aria-label=\"we lost the freedom to use our existing stack permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>“We lost the freedom to use our existing stack.”</h3>\n<p>One of the chief concerns that companies have shared with us involves service level agreements (SLAs). In particular, we’ve heard that many companies fear that Akamai will not offer the flexibility of custom tech stacks. Their concern is that if they use software or apps not provided by Akamai, they’ll lose the quality, availability, and features that they relied on before the merger. </p>\n<p>To put it into perspective, former Gigya customers complained to us that during the SAP acquisition, they didn’t want to switch their tech stack to SAP. However, in order to get a full SLA and the optimal service and features they had come to expect, it suddenly became necessary. </p>\n<p>The reason for their cold feet is simple: switching software can lead to a massive drain of resources within large companies. Therefore, it’s reasonable for companies to avoid that kind of change. Let’s face it, if you already have a tried-and-true tech stack, wouldn’t you want to choose a CIAM solution that works <em>with</em> it?</p>\n<h3 id=\"we-noticed-a-decline-in-support\" style=\"position:relative;\"><a href=\"#we-noticed-a-decline-in-support\" aria-label=\"we noticed a decline in support permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>“We noticed a decline in support.”</h3>\n<p>Anytime a big acquisition or disruption occurs in a company, there’s a high probability that customer service may suffer. In fact, time and again, customers told our consultants that they switched from Akamai/Janrain or Gigya due to a decline in technical assistance and customer support.</p>\n<h3 id=\"what-happened-to-auto-renew\" style=\"position:relative;\"><a href=\"#what-happened-to-auto-renew\" aria-label=\"what happened to auto renew permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>“What happened to auto-renew?”</h3>\n<p>Another customer related complaint occurred after Akamai acquired Janrain.  Janrain customers became concerned when their accounts did not auto-renew. Since the Janrain/Akamai merger, Akamai is exercising its right to renegotiate terms. As a result, <em>Janrain customers are reported to be wary of the fine print on these new terms</em>.</p>\n<h3 id=\"we-cant-afford-any-outages\" style=\"position:relative;\"><a href=\"#we-cant-afford-any-outages\" aria-label=\"we cant afford any outages permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>“We can’t afford any outages.”</h3>\n<p>Customers revealed that they noticed a <a href=\"https://status.janrain.com/incidents/j66wdht40wmc\">lot of downtime</a> on sites using <a href=\"https://deets.feedreader.com/secure-now.sportsnet.ca\">Akamai Identity Cloud as their provider</a>. Most recently, the <a href=\"https://www.theglobeandmail.com/business/article-i-missed-a-big-chunk-of-the-game-raptors-fans-frustrated-by-rogers/\">NBA Finals game outage</a> on Sportsnet created a lot of heat for Rogers. And since Janrain is the CIAM provider for Rogers, the outage is a result of their inability to handle peak loads. For any business that experiences surges in logins, downloads, or streaming, <a href=\"https://www.the20.com/blog/the-cost-of-it-downtime/\">downtime can cost $300,000</a> (on average) in lost revenue. </p>\n<p><strong>Key Takeaway</strong> </p>\n<p>Akamai is a security company, so its acquisition of Janrain confirms that CIAM is a security platform. Akamai clearly saw Janrain as a missing piece in their security company. </p>\n<p>However, LoginRadius made this pivot sooner than Janrain—in 2016, to be precise. Simply put, we've spent more years innovating and delivering value to enterprises than Janrain has. Here are just some of the reasons why LoginRadius is the best Janrain alternative for your business.</p>\n<h2 id=\"why-loginradius-should-be-your-janrain-alternative\" style=\"position:relative;\"><a href=\"#why-loginradius-should-be-your-janrain-alternative\" aria-label=\"why loginradius should be your janrain alternative permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Why LoginRadius Should Be Your Janrain Alternative</strong></h2>\n<p><strong>Our 100% uptime is second to none.</strong></p>\n<p>You don’t have to worry about surges or spikes driving customers away and hurting revenue. <em>LoginRadius is the only identity platform with a 100% uptime.</em></p>\n<p><strong>We’re a global leader in customer identity.</strong> </p>\n<p>LoginRadius was named a <a href=\"https://www.loginradius.com/press/loginradius-named-global-ciam-leader-by-identity-research-firm-kuppingercole/\">global CIAM leader</a> by KuppingerCole and has been <em>positioned ahead of other vendors such as ForgeRock, Okta, and Ping Identity.</em> Recently, <a href=\"https://www.loginradius.com/blog/identity/loginradius-announces-17m-series-funding-forgepoint-microsoft/\">LoginRadius received $17 million Series A funding</a>, led by ForgePoint Capital and Microsoft. <em>W__e may not be enterprise-size, but we’re enterprise grade—meaning you’ll get both dedicated service and an exceptional product from LoginRadius.</em> </p>\n<p><strong>We provide data privacy and consent solutions.</strong></p>\n<p>We follow the strictest government regulations for privacy and consent and offer out-of-the-box solutions for GDPR, CCPA, and COPPA compliance. <em>We also provide the highest industry standards for secure single sign-on, data storage, and customer access management.</em></p>\n<p><strong>We’re 100% CIAM with 24/7 tech support.</strong></p>\n<p>Our product consultants, customer support, and tech teams act quickly to meet your needs. <em>Data migration from your current provider is included, as are customization features and fast deployment.</em></p>\n<p><strong>Simply put, LoginRadius excels at what Akamai/Janrain doesn’t—**</strong><em>giving companies an edge over the competition.</em>** </p>\n<hr>\n<h3 id=\"know-your-audience\" style=\"position:relative;\"><a href=\"#know-your-audience\" aria-label=\"know your audience permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Know Your Audience</strong></h3>\n<p><em>“The secret to exceeding customer expectations</em></p>\n<p> <em>is knowing what customers want before they do.”</em></p>\n<hr>\n<h2 id=\"ready-to-switch-to-loginradius\" style=\"position:relative;\"><a href=\"#ready-to-switch-to-loginradius\" aria-label=\"ready to switch to loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>Ready to switch to LoginRadius?</strong></h2>\n<p>LoginRadius is a CIAM solution that offers seamless migration from your current provider within days. <em>We also do migration testing on a staging site, so your customers won’t notice a thing.</em></p>\n<p>Want to hear more about making the switch to LoginRadius? Call a LoginRadius digital identity consultant today at 1-844-625-8889. We’ll be happy to give you a product demo so you can compare LoginRadius with your current provider. </p>\n<p><a href=\"https://www.loginradius.com/book-demo/\"><img src=\"/23b2208278dbd4fe5b7ddff1307ce0b5/CTA-Graphics-for-Blogs-V02.01-15.webp\" alt=\"Janrain alternative\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 24, 2019","updated_date":null,"title":"Why LoginRadius Is the Best Akamai Identity Cloud (Janrain) Alternative","tags":["public-sector"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.408450704225352,"src":"/static/f0a4b456371af805e58752d5abeee474/7f8e9/janrain-feature.webp","srcSet":"/static/f0a4b456371af805e58752d5abeee474/61e93/janrain-feature.webp 200w,\n/static/f0a4b456371af805e58752d5abeee474/1f5c5/janrain-feature.webp 400w,\n/static/f0a4b456371af805e58752d5abeee474/7f8e9/janrain-feature.webp 768w","sizes":"(max-width: 768px) 100vw, 768px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"fields":{"slug":"/identity/looking-gigya-alternative-try-loginradius-superior-modern-identity-platform/"},"html":"<p>The customer identity space is in a dynamic phase, with lots of activity around mergers and acquisitions (M&#x26;A) and investment.</p>\n<p>One notable event was the <a href=\"https://techcrunch.com/2017/09/24/sap-is-buying-identity-management-firm-gigya-for-350m/\"><strong>SAP acquisition of Gigya</strong></a> <strong>in late 2017</strong>.</p>\n<p>Now that a year has gone by, existing Gigya contracts are ending. Engineers are probably thinking that everything’s fine and that not much has changed with their customer identity solution.</p>\n<p>But as a leader, you should be worried. The Gigya technology may not have changed (yet) but the company that delivers it has changed significantly. Now is the time to start looking for the best Gigya alternatives.</p>\n<h2 id=\"acquisitions-create-problems-for-customers\" style=\"position:relative;\"><a href=\"#acquisitions-create-problems-for-customers\" aria-label=\"acquisitions create problems for customers permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Acquisitions Create Problems for Customers</h2>\n<p>M&#x26;A can be exciting for everyone associated with the acquired company. However, in some cases an acquisition can be damaging for customers, partners, and employees, depending on who the acquirer is.</p>\n<p>One such case is when the acquirer is significantly larger than the acquired company and they do not let the acquired company operate independently. The differences in size and power create culture clash, which is one of the <a href=\"https://www.aon.com/attachments/thought-leadership/M_A_Survey.pdf\">top reasons that mergers fail</a>.</p>\n<p>Culture clash then leads to staff turnover, which can be <a href=\"https://www.jamespwalsh.com/Resources/Walsh%20-%201988%20-%20Top%20management%20turnover%20following%20mergers%20and%20acquistions.pdf\">up to three times higher</a> than in non-acquired companies.</p>\n<p>When employees and partners leave an acquired company, customers are the most hurt group among the three. Customers have to move quickly to find an alternative provider, and it also impacts resource allocation, service quality, and all of their future plans.</p>\n<p>This is the tough situation where Gigya customers now find themselves.</p>\n<h2 id=\"why-are-companies-looking-for-other-solutions-like-gigya-sap\" style=\"position:relative;\"><a href=\"#why-are-companies-looking-for-other-solutions-like-gigya-sap\" aria-label=\"why are companies looking for other solutions like gigya sap permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Why Are Companies Looking for Other Solutions Like Gigya (SAP)?</h2>\n<p>In the past twelve months, many customers have done their research on Gigya competitors and migrated away from <strong>Gigya to LoginRadius</strong>. We’ve heard from them about why they switched, and I wanted to share their feedback.</p>\n<h3 id=\"sap-is-not-a-personality-fit-its-big-old-and-slow\" style=\"position:relative;\"><a href=\"#sap-is-not-a-personality-fit-its-big-old-and-slow\" aria-label=\"sap is not a personality fit its big old and slow permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>“SAP is not a personality fit. It’s big, old, and slow.”</strong></h3>\n<p>Gigya no longer has its young, fast-moving culture from pre-acquisition days. It’s now part of a long-standing and enormous organization at SAP, which means a slower pace of technological innovation.</p>\n<p>SAP has 95,000 employees and Gigya had 500, which makes SAP 190 times larger. It’s not hard to guess which culture is going to win out.</p>\n<p>If your company chose Gigya because their agility and cutting-edge creativity were a great match for your corporate personality, there’s now a big disconnect.</p>\n<h3 id=\"our-contacts-and-partners-are-no-longer-there\" style=\"position:relative;\"><a href=\"#our-contacts-and-partners-are-no-longer-there\" aria-label=\"our contacts and partners are no longer there permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>“Our contacts and partners are no longer there.”</strong></h3>\n<p>Customers aren’t the only ones who don’t want to make the leap to a different culture. Employees are even more affected by the organizational change, and a lot of them leave rather than try to adapt.</p>\n<p>Many of the people who took care of Gigya’s customers are gone by now. If you’re one of those customers, this turnover marks an end to your human relationship with Gigya.</p>\n<p>Then you get assigned to new account managers from the SAP culture and SAP strategies, not from Gigya’s young and innovative culture.</p>\n<h3 id=\"were-now-a-tiny-customer-for-the-massive-sap-enterprise\" style=\"position:relative;\"><a href=\"#were-now-a-tiny-customer-for-the-massive-sap-enterprise\" aria-label=\"were now a tiny customer for the massive sap enterprise permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>“We’re now a tiny customer for the massive SAP enterprise.”</strong></h3>\n<p>Gigya used to be a small company with a few thousand customers. They were able to give quick personalized support.</p>\n<p>Now, as SAP, they have a huge client base.</p>\n<p>Perhaps you were in the top 10% of Gigya customers. Post-acquisition, you’re probably not even in the top 40% of customers. Big acquiring companies have customers who pay them $100 million or more, and you end up becoming a Tier 3 or 4 customer.</p>\n<p>You never get the same level of care you enjoyed before from your <a href=\"https://www.loginradius.com/\">CIAM vendor</a>.</p>\n<p>SAP is also outsourcing its support for Gigya customers to external partners who don’t necessarily have the level of expertise required. They may not understand your actual implementation. It can take days or weeks to resolve issues.</p>\n<h3 id=\"with-sap-were-stuck-using-sap-products-and-technologies\" style=\"position:relative;\"><a href=\"#with-sap-were-stuck-using-sap-products-and-technologies\" aria-label=\"with sap were stuck using sap products and technologies permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a><strong>“With SAP, we’re stuck using SAP products and technologies.”</strong></h3>\n<p>SAP Customer Data Cloud, the new name for Gigya’s customer identity and access management (CIAM) platform, is just a tiny part of the SAP universe. CIAM is now one offering out of 200.</p>\n<p>Gigya uses SAP servers for colocation, and they only have five regional data centers.</p>\n<h2 id=\"top-5-reasons-companies-are-migrating-from-gigya-sap-to-loginradius\" style=\"position:relative;\"><a href=\"#top-5-reasons-companies-are-migrating-from-gigya-sap-to-loginradius\" aria-label=\"top 5 reasons companies are migrating from gigya sap to loginradius permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Top 5 Reasons Companies Are Migrating from Gigya (SAP) to LoginRadius</h2>\n<p>Many large brands, including a large media company with 30 million users, have migrated from Gigya/SAP to LoginRadius. Here are the top 5 reasons why big brands are considering LoginRadius as the best Gigya alternative.</p>\n<h3 id=\"1-loginradius-is-a-young-and-innovative-company-that-is-a-leader-in-the-ciam-space\" style=\"position:relative;\"><a href=\"#1-loginradius-is-a-young-and-innovative-company-that-is-a-leader-in-the-ciam-space\" aria-label=\"1 loginradius is a young and innovative company that is a leader in the ciam space permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. LoginRadius is a young and innovative company that is a leader in the CIAM space.</h3>\n<p>“Innovate or die” is the mantra of the 21st century for tech businesses. The LoginRadius <a href=\"https://www.linkedin.com/pulse/loginradius-our-evolution-end-to-end-customer-identity-rakesh-soni/\">customer identity platform</a> is the most modern offering in its class. In the security industry, it’s essential to stay current and jump on new developments quickly, and we have the agility to do that. The company has been recognized as a leader by many analyst firms, including KuppingerCole, Gartner, and Forrester.</p>\n<h3 id=\"2-customer-identity-is-our-core-business\" style=\"position:relative;\"><a href=\"#2-customer-identity-is-our-core-business\" aria-label=\"2 customer identity is our core business permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Customer identity is our core business.</h3>\n<p>LoginRadius started in customer identity and it’s what we do. The full focus of our technology and business leadership is on creating modern customer experiences and helping businesses win customer trust.</p>\n<h3 id=\"3-loginradius-infrastructure-is-global-and-ready-to-scale\" style=\"position:relative;\"><a href=\"#3-loginradius-infrastructure-is-global-and-ready-to-scale\" aria-label=\"3 loginradius infrastructure is global and ready to scale permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. LoginRadius infrastructure is global and ready to scale.</h3>\n<p>LoginRadius is deployed on Microsoft Azure cloud servers with failover to Amazon Web Services. Our platform scales to handle hundreds of millions of customers and over 150K logins per second. We have 35 global data storage centers (and counting).</p>\n<h3 id=\"4-we-have-in-house-customer-support\" style=\"position:relative;\"><a href=\"#4-we-have-in-house-customer-support\" aria-label=\"4 we have in house customer support permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>4. We have in-house customer support.</h3>\n<p>LoginRadius offers our clients a dedicated support team, consisting of a customer success manager and implementation engineer. These are LoginRadius experts who understand your environment and resolve your issues quickly.</p>\n<h3 id=\"5-loginradius-has-the-best-system-availability\" style=\"position:relative;\"><a href=\"#5-loginradius-has-the-best-system-availability\" aria-label=\"5 loginradius has the best system availability permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>5. LoginRadius has the best system availability.</h3>\n<p>LoginRadius is the only CIAM platform on the market that guarantees 100% uptime, compared to 99.9% offered by other vendors. While other platforms have minutes to hours of unscheduled downtime as well as downtime for regular maintenance, <a href=\"https://www.loginradius.com/\">LoginRadius is simply always available</a>.</p>\n<h2 id=\"migration-program-for-gigya-customers-looking-to-move\" style=\"position:relative;\"><a href=\"#migration-program-for-gigya-customers-looking-to-move\" aria-label=\"migration program for gigya customers looking to move permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Migration Program for Gigya Customers Looking to Move</h2>\n<p>LoginRadius has migrated many customers, and we’re good at it. Our team will work with you through the whole process and manage the production deployment so there’s very little effort required on your side.</p>\n<p>We have automated software for a seamless migration and quick go-to-market, and we do most of the migration testing. Your users won’t be affected—they won’t even notice anything. Customers are pleasantly surprised at how simple the process is.</p>\n<p>If you’d like to hear more about customers making the switch to LoginRadius, contact us at 1-844-625-8889. We can also <a href=\"https://www.loginradius.com/schedule-demo/\">give you a demo</a> so you can see how our features compare.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=looking-gigya-alternative-try-loginradius-superior-modern-identity-platform\"><img src=\"/c001db558b99ac0189e5dff5eeb4a6f4/CTA-Graphics-for-Blogs-V02.01-14-1024x310.webp\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"February 20, 2019","updated_date":null,"title":"Looking for a Gigya Alternative? Try LoginRadius, a Superior and Modern Identity Platform","tags":["public-sector"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":2,"src":"/static/9616a6646dab98d1ceeccc4de0811cbd/58556/STUPID-WPPPPPPP-1.webp","srcSet":"/static/9616a6646dab98d1ceeccc4de0811cbd/61e93/STUPID-WPPPPPPP-1.webp 200w,\n/static/9616a6646dab98d1ceeccc4de0811cbd/1f5c5/STUPID-WPPPPPPP-1.webp 400w,\n/static/9616a6646dab98d1ceeccc4de0811cbd/58556/STUPID-WPPPPPPP-1.webp 800w,\n/static/9616a6646dab98d1ceeccc4de0811cbd/99238/STUPID-WPPPPPPP-1.webp 1200w,\n/static/9616a6646dab98d1ceeccc4de0811cbd/7c22d/STUPID-WPPPPPPP-1.webp 1600w,\n/static/9616a6646dab98d1ceeccc4de0811cbd/c9a56/STUPID-WPPPPPPP-1.webp 2112w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"fields":{"slug":"/identity/enterprise-needs-digital-business-transformation-strategy/"},"html":"<h2 id=\"how-to-meet-customer-needs-and-grow-revenue-with-customer-identity-management\" style=\"position:relative;\"><a href=\"#how-to-meet-customer-needs-and-grow-revenue-with-customer-identity-management\" aria-label=\"how to meet customer needs and grow revenue with customer identity management permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Meet Customer Needs and Grow Revenue with Customer Identity Management</h2>\n<h3 id=\"is-your-enterprise-ready-for-a-digital-transformation\" style=\"position:relative;\"><a href=\"#is-your-enterprise-ready-for-a-digital-transformation\" aria-label=\"is your enterprise ready for a digital transformation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Is Your Enterprise Ready for a Digital Transformation?</h3>\n<p>Enterprise CIOs and VPs of technology face growing demands to scale their digital platforms. Gartner estimates that 2020 is the sink-or-swim year for mid- and large-sized enterprises—organizations with more than $250 million in annual revenue—to modernize their digital infrastructure.</p>\n<p>Scaling digital platforms can be a daunting task. It involves large-scale efforts to accommodate growing demands in online customer experience, data personalization, and a centralized identity infrastructure for your users. What’s more, these initiatives often rely on comprehensive upheavals to business and operating models.</p>\n<p>By 2020, businesses will have to develop new digital experiences and unique online services just to stay competitive, let alone to get ahead. Top companies across media, telecommunications, and financial industries feel pressure to increase market share and deliver more value to their customers. Executives know they can’t fall too far behind.</p>\n<h4 id=\"digital-capabilities-are-lagging\" style=\"position:relative;\"><a href=\"#digital-capabilities-are-lagging\" aria-label=\"digital capabilities are lagging permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Digital capabilities are lagging</h4>\n<p><img src=\"/62286922b2cee6cc348d181a4ee413bb/rawpixel-570911-unsplash-e1543257473342.webp\"></p>\n<p>Additional Gartner data highlights the challenges that come with this changing landscape. Over half of all enterprises surveyed have less than expert-level capabilities for implementing or updating critical digital platforms, such as managing data systems for analytics and modernizing technology ecosystems to better serve users.</p>\n<p>Only about 34% of digital technologies are adequately optimized for enterprise businesses in all industries, but enterprise CEOs have identified, on average, a need to drive 11% of growth exclusively from “digital revenue.”</p>\n<h4 id=\"even-digital-optimization-isnt-enough\" style=\"position:relative;\"><a href=\"#even-digital-optimization-isnt-enough\" aria-label=\"even digital optimization isnt enough permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Even digital optimization isn’t enough</h4>\n<p>Tackling this gap requires more than digital optimization. A full business transformation to create new digital services and business models are crucial, especially for customer retention.</p>\n<p>Imagine an online portal and an accompanying mobile app where customers have to log in at each new touchpoint, struggling to remember their passwords. Their customer journey is disjointed and impersonal. Many studies show that not only will customer engagement decrease but churn rates will gradually increase as well.</p>\n<h2 id=\"customer-identity-management-to-drive-revenue-growth\" style=\"position:relative;\"><a href=\"#customer-identity-management-to-drive-revenue-growth\" aria-label=\"customer identity management to drive revenue growth permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Customer Identity Management to Drive Revenue Growth</h2>\n<p><img src=\"/76b7599830c5c607c3d07d2b02257012/damian-zaleski-843-unsplash.webp\"></p>\n<p>So how can you make sure that your organization stays ahead of the curve with a business digital transformation when faced with resource challenges and competitor pressure?</p>\n<p><strong>1. Go beyond optimization to enterprise-level digital transformation.</strong></p>\n<p>By 2022, just two years after Gartner’s sink-or-swim date, digital platform adoption will create new market leaders in roughly half of all industries.</p>\n<p>Success in the face of such drastic, impending shifts hinges on the foresight of CIOs and tech VPs to build new revenue opportunities for their organizations. <strong>Simply enhancing previous technologies to improve productivity and customer experience will only safeguard bottom lines.</strong> A fully proactive solution also involves creating new revenue streams and transforming business model in the digital era.</p>\n<p><strong>2. Adopt low-risk third-party platforms.</strong></p>\n<p>With third-party platforms, you can optimize resource efficiency and set yourself up for highly customizable solutions that can be applicable for new business-development opportunities across your digital brand. A flexible, cloud-based solution can offer out-of-the-box third-party integrations to meet user demands and build <a href=\"https://www.loginradius.com/blog/growth/unified-identity-ensures-great-customer-interactions/\">unified customer profiles</a>.</p>\n<p>By investing in a cloud-based customer identity platform, for example, you can lay the foundation for a transformative digital business solution to simplify your operations while enabling scalability across markets and customer channels.</p>\n<p><strong>3. Identify what’s important to bring clarity to the task at hand.</strong></p>\n<p>Studies show that a digital identity strategy that enhances the registration experience, authenticates customers, and personalizes the user journey improves the bottom line, streamlines business processes, and ultimately delivers value.</p>\n<p>Specifically, roughly 80% of customers express frustration when their identity and data are lost when switching between channels. Almost as many will not do business with companies whose digital platforms aren’t tailored uniquely for them. Those statistics have nearly doubled in a few short years thanks to popular brands like Amazon, Netflix, Starbucks, and Uber. These providers continually improve their technologies to augment the digital experience for their customers and raise the “expectations game” across the board.</p>\n<p>Focusing on a digital identity strategy will secure and enhance your online services at a broad level. By disrupting your technology landscape to rethink how your organization responds to trends like digital identity convergence, big data and analytics, and “device identity,” you can setup your enterprise business for success in the future.</p>\n<p>But what does this kind of digital identity strategy look like?</p>\n<h4 id=\"identity-convergence-responding-to-the-new-diverse-customer\" style=\"position:relative;\"><a href=\"#identity-convergence-responding-to-the-new-diverse-customer\" aria-label=\"identity convergence responding to the new diverse customer permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Identity convergence: responding to the new, diverse customer</h4>\n<p><img src=\"/e75ba5b47f7d82bd64df45b0587d089d/daniel-gzz-105307-unsplash.webp\"></p>\n<p>In today’s globalized world, your customers are no longer <em>merely</em> customers when they access your digital services. Instead, they converge from multiple persona types:</p>\n<ul>\n<li>An online user of a direct revenue service</li>\n<li>An evangelizing content creator</li>\n<li>A consumer of community information and marketing collateral</li>\n</ul>\n<p>In the past, standalone, online-based revenue streams and information databases could coexist with little need for overlap, let alone integration. However, in today’s burgeoning digital-business ecosystem, you need a management tool for customer identity that recognizes multiple personas and links them to the same online identity.</p>\n<h4 id=\"leverage-data-and-analytics-to-serve-your-users-better\" style=\"position:relative;\"><a href=\"#leverage-data-and-analytics-to-serve-your-users-better\" aria-label=\"leverage data and analytics to serve your users better permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Leverage data and analytics to serve your users better</h4>\n<p>As more operational models among enterprise businesses encounter digital identities and the proliferating number of third-party platforms that host and support them, data and analytics needs become more complex. Companies must increasingly consider how they will:</p>\n<ul>\n<li>manage swaths of data</li>\n<li>connect it across their entire digital landscape</li>\n<li>leverage this information for customer success</li>\n</ul>\n<p>A central, cloud-based solution to handle all of your customer identity needs can help consolidate the digital identities of your users, removing data silos throughout your whole digital ecosystem.</p>\n<h4 id=\"device-identity-growing-when-the-internet-is-everywhere\" style=\"position:relative;\"><a href=\"#device-identity-growing-when-the-internet-is-everywhere\" aria-label=\"device identity growing when the internet is everywhere permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>“Device identity”: growing when the internet is everywhere</h4>\n<p><img src=\"/75736fc0004a7fbaef153ac6c843343d/bence-boros-573486-unsplash.webp\"></p>\n<p>With the emergence of the internet of things and myriad mobile devices on the market, taking advantage of identity-based opportunities around all of the devices and electronic items can make the difference in leading the pack among your competitors or constantly having to play catch-up.</p>\n<ul>\n<li>Users today might expect a simplified online registration when buying products across web browsers, phones, smartwatches, or their Amazon Echo or Google Home.</li>\n<li>Exercise junkies might expect their fitness devices to sign them in to their account at their local gym’s computer terminal or sync with their online account from home.</li>\n<li>Citizens might expect to be able to conveniently switch between their phone and their tablet when logging in to a city government’s online platform. They want to book an outdoor event and pay their property taxes, all with a single sign-on (SSO).</li>\n</ul>\n<p>Whatever the device and the customer’s need, your organization has to prepare for these expectations as they relate to a plethora of digital devices, now and into the future, if growth and sustainability are part of your enterprise’s long-term roadmap.</p>\n<h2 id=\"customer-identity-and-access-management-ciam\" style=\"position:relative;\"><a href=\"#customer-identity-and-access-management-ciam\" aria-label=\"customer identity and access management ciam permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Customer Identity and Access Management (CIAM)</h2>\n<p><img src=\"/9f6e28b61e3053571a0eaeb08ab6e8c3/heidi-sandstrom-173946-unsplash.webp\"></p>\n<p>Planning for Gartner’s 2020 threshold for digital transformation need not be a daunting task after all. A <a href=\"https://www.loginradius.com/customer-identity-management-b2c-ciam/\">B2C CIAM solution</a> for your company is an example of a cloud-based, holistic solution to store, manage, and secure all of your customer data and identities.</p>\n<p>A customer identity solution provides several benefits ranging from personalized user journeys and seamless SSO capabilities, serving as a strong starting point for a digital transformation strategy.</p>\n<p><strong>Look for a strong, enterprise-grade solution</strong> that offers secure data storage, data encryption, and superior uptime capabilities to easily access and maintain customer information. You’ll be able to protect your customers’ identity and ensure that your services always function reliably so you can scale your organization and stay ahead of market trends.</p>\n<p>With the right CIAM platform, for example, you can track your customer’s entire digital journey and integrate the data with marketing automation tools to cultivate your marketing and upselling campaigns directly within your own platforms. Plus, offering a coherent omnichannel experience via SSO means your customers can browse your digital service, shop online, interact with mobile-first content, and ask support questions on social media, all without having to re-authenticate themselves each time. Seizing on these benefits, you can eliminate data silos and create a single online identity for each one of your customers.</p>\n<p>If you’re interested in learning how a cloud-based CIAM solution can help your enterprise transform your digital infrastructure, download <a href=\"https://www.loginradius.com/resource/4-key-entry-points-to-a-digital-transformation/\">4 Key Entry Points to a Digital Transformation</a>. This e-book features case studies for each specific entry point to help you understand how a best-of-breed identity platform could provide value to you.</p>\n<p><a href=\"https://www.loginradius.com/resource/4-key-entry-points-to-a-digital-transformation/\"><img src=\"/2ef7af73eb28e239b8454d4b12c57446/4-key-entry-points-to-digital-transformation-1024x310.webp\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"November 26, 2018","updated_date":null,"title":"Why Your Enterprise Needs a Digital Business Transformation Strategy","tags":["public-sector"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.492537313432836,"src":"/static/7eae9b404386c06cac437942ea2770ec/58556/rawpixel-579231-unsplash-1.webp","srcSet":"/static/7eae9b404386c06cac437942ea2770ec/61e93/rawpixel-579231-unsplash-1.webp 200w,\n/static/7eae9b404386c06cac437942ea2770ec/1f5c5/rawpixel-579231-unsplash-1.webp 400w,\n/static/7eae9b404386c06cac437942ea2770ec/58556/rawpixel-579231-unsplash-1.webp 800w,\n/static/7eae9b404386c06cac437942ea2770ec/99238/rawpixel-579231-unsplash-1.webp 1200w,\n/static/7eae9b404386c06cac437942ea2770ec/7c22d/rawpixel-579231-unsplash-1.webp 1600w,\n/static/7eae9b404386c06cac437942ea2770ec/dc072/rawpixel-579231-unsplash-1.webp 2500w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}},{"node":{"fields":{"slug":"/identity/municipals-investing-citizen-engagement/"},"html":"<p>Improving quality of life for citizens is at the heart of many municipal digital initiatives. Even so, city leaders often choose to focus on improving their technology infrastructure without considering citizen engagement.</p>\n<p>A successful digital transformation can have many <a href=\"https://www.loginradius.com/resource/top-5-ways-to-improve-citizen-engagement-2/\">benefits for both citizens and municipalities</a>. But if cities do not put the energy into improving their citizen engagement, they will struggle to truly transform their communities.</p>\n<p>By investing in a well-designed and implemented citizen-centric solution, municipalities can achieve the following benefits.</p>\n<h3 id=\"1-increase-citizen-satisfaction-with-government-performance\" style=\"position:relative;\"><a href=\"#1-increase-citizen-satisfaction-with-government-performance\" aria-label=\"1 increase citizen satisfaction with government performance permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>1. Increase citizen satisfaction with government performance</h3>\n<p><img src=\"/1a646b5f77388415e2621a5d5cec5ca8/collaboration-colleagues-community-2.webp\"></p>\n<p>Citizens want to engage with their local government. They want to be able to share their views and access channels to participate in the decisions of government, connect with representatives, and be assured that their input has meaning and relevance.</p>\n<p>Citizens have been very vocal about these methods of engagement, so it should come as no surprise that communities are happiest when their citizens feel well-informed about the municipality's business and have opportunities to be part of policy formation.</p>\n<h3 id=\"2-enhance-citizen-trust-in-civic-institutions\" style=\"position:relative;\"><a href=\"#2-enhance-citizen-trust-in-civic-institutions\" aria-label=\"2 enhance citizen trust in civic institutions permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>2. Enhance citizen trust in civic institutions</h3>\n<p><img src=\"/96aff7164972798b815b07b2ed7b0433/berlin-building-business-3.webp\"></p>\n<p>The public has been demanding more transparency and accountability from government for years. These demands are prompting municipalities to change how they engage with the public.</p>\n<p>Especially in the era of media and \"fake news,\" it has never been more important for municipalities to have a direct way of engaging their citizens. Organizations need to ensure that the facts are correctly communicated, but also need to listen carefully to the public's voices.</p>\n<p>Municipalities need to have a direct line of engagement between themselves and the community instead of relying on the media to connect them. Otherwise, they will struggle to build trust. The more involved and accurately informed a community is, the more likely citizens will trust the institution that is engaging with them. </p>\n<h3 id=\"3-get-the-most-out-of-your-digital-solutions-which-saves-an-enormous-amount-of-time-and-money\" style=\"position:relative;\"><a href=\"#3-get-the-most-out-of-your-digital-solutions-which-saves-an-enormous-amount-of-time-and-money\" aria-label=\"3 get the most out of your digital solutions which saves an enormous amount of time and money permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>3. Get the most out of your digital solutions, which saves an enormous amount of time and money</h3>\n<p><img src=\"/ea0f43721710974145272e12366a302e/advice-advise-advisor-4.webp\"></p>\n<p>Engaging the community to keep them better informed about what is going on will only help in the long run. For example, instead of spending too much time and resources on projects that are only going to get protested, why not get community input from the beginning? If citizens are more involved in the process, municipalities can reduce lengthy and expensive legal appeals as well.</p>\n<h2 id=\"how-to-improve-citizen-engagement\" style=\"position:relative;\"><a href=\"#how-to-improve-citizen-engagement\" aria-label=\"how to improve citizen engagement permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>How to Improve Citizen Engagement</h2>\n<p>Many municipalities are now undergoing <a href=\"https://www.loginradius.com/blog/identity/customer-experience-driving-digital-transformations/\">digital transformations</a> in order to improve transparency and communication. After all, with a more sophisticated digital ecosystem, you will be able to simplify how you interact with your citizens.</p>\n<p>Undergoing a digital transformation, however, is just one of the much-needed steps. In order to truly engage your citizens, you need to know who they are. To learn who they are, you have to incorporate digital identity into your transformation. </p>\n<p>How does digital identity help with engagement? In our new e-book, we have listed the top 5 ways to improve your citizen engagement, which include creating a seamless digital service by unifying citizen services and identity, as well as improving your privacy and security efforts. You can check out the new e-book <a href=\"https://www.loginradius.com/resource/top-5-ways-to-improve-citizen-engagement-2/\">here</a>. <img src=\"/0a80e2261e1690438d02b5fb6d35513d/Ebook-thumb.webp\"></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","frontmatter":{"date":"June 18, 2018","updated_date":null,"title":"Why Municipalities Are Investing in Citizen Engagement","tags":["public-sector"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.4705882352941178,"src":"/static/211730b2addbb6996b0be156bf8569a8/58556/collaboration-colleagues-community-398532-1.webp","srcSet":"/static/211730b2addbb6996b0be156bf8569a8/61e93/collaboration-colleagues-community-398532-1.webp 200w,\n/static/211730b2addbb6996b0be156bf8569a8/1f5c5/collaboration-colleagues-community-398532-1.webp 400w,\n/static/211730b2addbb6996b0be156bf8569a8/58556/collaboration-colleagues-community-398532-1.webp 800w,\n/static/211730b2addbb6996b0be156bf8569a8/99238/collaboration-colleagues-community-398532-1.webp 1200w,\n/static/211730b2addbb6996b0be156bf8569a8/90fb1/collaboration-colleagues-community-398532-1.webp 1500w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Rakesh Soni","github":"oyesoni","avatar":"rakesh-soni.webp"}}}}]}},"pageContext":{"tag":"public-sector"}},"staticQueryHashes":["1171199041","1384082988","2100481360","23180105","528864852"]}