loginradiusloginradius Blog

Leading the Charge in Customer IAM: LoginRadius Recognized as an Overall Leader by KuppingerCole

KuppingerCole's 2024 Leadership Compass reports recognize LoginRadius as an overall leader in customer identity and access management (CIAM). LoginRadius excels in innovative workflow management, extensive integration capabilities, comprehensive B2B features, and top-tier security standards.

Rakesh Soni
By Rakesh Soni
July 10, 2024
3 min read

LoginRadius CIAM Platform

Our Product Experts will show you the power of the LoginRadius CIAM platform, discuss use-cases, and prove out ROI for your business.

Book A Demo Today

Looking for a Gigya Alternative? Try LoginRadius, a Superior and Modern Identity Platform

The Gigya technology may not have changed (yet), but it has dramatically changed the business that provides it. Now is the moment to start searching for the best alternatives to Gigya.

Rakesh Soni
By Rakesh Soni
February 20, 2019
5 min read

Presenting: Progressive Profiling from LoginRadius

A new feature of the LoginRadius Identity Platform is progressive profiling, which gradually collects data from customers in an automated way.

Deepak Gupta
By Deepak Gupta
February 07, 2019
2 min read

Best Practices for Choosing Good Security Questions

Security questions will bring to your authentication process an extra layer of certainty. Security problems are an alternative way to recognise your customers when they have forgotten their password, entered too many times the wrong passwords, or attempted to log in from a location or unknown computer.

Deepak Gupta
By Deepak Gupta
January 31, 2019
8 min read

How Do I Know If My Email Has Been Leaked in a Data Breach?

To log into their online accounts, many individuals use their email addresses and a short collection of passwords (or even only one password). Sadly, this means that every hacker already has half your login information with your email address. Add in multiple login violations from big-name digital service providers and you have a catastrophe recipe.

Deepak Gupta
By Deepak Gupta
January 10, 2019
5 min read

The Death of Passwords [Infographic]

Are usernames and passwords really the best way to protect your customers? Check out this infographic and learn about the new technologies and authentication methods that are replacing passwords.

Deepak Gupta
By Deepak Gupta
December 19, 2018
1 min read

How to Use Multi-Factor Authentication When You Don’t Have Cell Phone Access

To verify the identity of clients, many security-minded organisations use multi-factor authentication. The most popular approach is to send a code via SMS text message to customers, which the customer then enters on the website or app. But what if you drive and have no mobile phone service? For authenticating yourself, you have a few other choices. Before you fly, just make sure to set them up!

Deepak Gupta
By Deepak Gupta
December 19, 2018
6 min read