LR LogoSWI

The latest news in the world of engineering.

Visit Blog

Identity and Access Management (IAM), including security and customer experience.

Fuel

Grow your business to millions.Engage and retain your customers.

Visit Blog
Manish Tiwari

Manish Tiwari

Manish Tiwari is working as a Technical Support Manager at LoginRadius. He is a dynamic & versatile professional in IT service management, technical support, maintenance, and troubleshooting. He loves playing cricket, watching movies, and cooking in his free time.

Why Should You be Customizing Your Identity System to Your Needs

Customizing a user identity system is a whole different concept and isn’t just limited to adding a personalized greeting for a user with their name. Let’s understand this in detail.

Manish Tiwari
Manish Tiwari
September 07, 2021
4 min read

How OTT Services can Simplify Authentication on Various Devices

In this post, we’ll understand the importance of secure authentication through a consumer identity and access management (CIAM) solution and how it paves the path for safeguarding consumer identities on different devices for OTT platforms.

Manish Tiwari
Manish Tiwari
August 10, 2021
4 min read

All About Google One Tap Login—Explained!

Consumers prefer basic login experiences over complicated signup procedures. The Google One-Tap Login feature, available on Android phones, allows users to quickly sign up for apps or web services with their Google credentials without creating an account.

Manish Tiwari
Manish Tiwari
June 11, 2021
3 min read

What is Authentication

Authentication is the process of uniquely identifying an individual via a set of credentials. In the digital world, authentication is termed as verifying a person's identity or an electronic device. Authentication becomes necessary because it increases the security of consumer's data.

Manish Tiwari
Manish Tiwari
March 29, 2021
3 min read

What is Brute Force Attack

In brute force attacks, you are not exploiting any vulnerability in the web application. Instead, you are trying all the possible combinations and permutations of passwords and usernames of the victim and trying to see if you get any of those right.

Manish Tiwari
Manish Tiwari
February 27, 2021
3 min read

Consumer Digital Identity Trend Report 2020

Optimize Your Conversion Funnel With Core Customer Behavior Analysis

Download Now