Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Three key customer IAM trends for 2021

Looking ahead to 2021, the pandemic will continue to drive business interactions with consumers online. Customer identity and access management (CIAM) products should see explosive growth as these technologies will be essential for securing digital storefronts and providing enhanced experiences.

By Prabath Siriwardena
SEC0820-Data-Feat-slide1_900px.jpg
December 17, 2020

The recent constraints on physical businesses have pushed organizations to accelerate plans to move operations to the digital world, often shrinking timelines from years to months. Within this context, the dependence on online commerce has increased significantly, and new sales models are blossoming. Global e-commerce sales are expected to top USD 4.2 trillion in 2020 and reach more than USD 6.5 trillion by 2023, explained in an article by e-commerce giant Shopify. Companies across all sectors—such as those in banking, retail, healthcare, public, education, transportation and logistics, energy and utilities, and manufacturing—are increasingly leveraging the Internet to provide necessary products and services to consumers.

However, as organizations pivot to digital infrastructures, they increasingly face challenges and tension as the need to ensure customer trust and privacy pull against the importance of providing exceptional user experiences across all touchpoints. A strong security and CIAM strategy will be essential to address these needs and ensure that information remains protected against outside threats.

Today, identity has become the glue for all contextual marketing. The main objective of CIAM is to drive revenue growth by leveraging identity data to acquire and retain consumers. It helps to build an identity-centric ecosystem to nurture an anonymous website visitor into a well-known, loyal customer. The CIAM market is unsaturated and growing, and according to Markets and Markets, it is projected to expand from USD 7.6 billion in 2020 to USD 15.3 billion by 2025, at a compound annual growth rate of 15.1%.

The future of business has changed drastically due to the rapid advancement of the remote work era from the pandemic. Here are three key CIAM market trends that security professionals should be aware of as they finalize their 2021 plans.

 

Growing adoption of digital strategies drives demand for CIAM

COVID-19 has pushed a wide range of businesses that were not previously digitally driven, such as grocery stores and restaurants, to offer goods and services online. Such businesses are now forced to adopt digital strategies to survive and thrive. However, this also opens up entirely new opportunities. Where these businesses once largely maintained transactional relationships with customers, they can now start to use knowledge about consumer identities to build customer profiles, new partnerships, and new services that drive longer-term and higher-value relationships for the business and the customer alike. This imperative will drive demand for high-performance, cost-effective CIAM solutions as businesses seek to focus on their core strengths rather than developing proprietary systems on their own.

 

Providing customers control over their data is key

The pandemic ushered in growing demand for giving consumers control over the information they want access to or shared, most notably regulations around open healthcare. This puts ‘identity’ front and center. Businesses must know who’s who, and who can have access to what in the digital world. At the same time, it’s critical to offer an effortless and seamless experience that minimizes any barriers to consumers interacting online. 

Maintaining this delicate balance leads to another vital requirement: self-service. Customers should be able to update and review their privacy preferences, such as using different emails for different activities, changing associated profile information, and updating contact information. At the same time, users should be able to adjust their security profiles by configuring recovery mechanisms and registering trusted devices for login. With the advancement of privacy regulations across the world, modern businesses must also give users data portability and the ability to deregister. CIAM solutions help to give consumers control over their data and keep it safe while creating positive user experiences and customer insights that help businesses increase revenue and growth.

 

Keeping data private is a necessity

Privacy will no longer be a luxury but a necessity, and businesses will need to secure consumer data more so than ever before as failure to do so will impact a company’s reputation, stock, and sale price. With regulations, such as the California Consumer Privacy Act (CCPA) and General Data Protection Regulation (GDPR) coming into effect—and various other privacy laws making their way through legislatures—allowing users to control their data and safeguarding privacy has become vital.

Customers now expect businesses to reveal what information they gather, delete data if requested, and explicitly ask for consent to save and share data. As developer-friendly CIAM platforms continue to evolve in 2021 (e.g., to further support areas like artificial intelligence, automation, and advanced authentication), so must the adoption of these platforms by businesses to ensure that customers are protected at all times.

In the past, businesses have been faced with an unenviable decision: either build a custom identity solution from scratch, which can be time-consuming and leave gaps in security, or purchase a pre-defined offering that compromises the user experience. However, faced with uncompromising data regulations and growing consumer expectations, businesses need to go beyond traditional identity and access management (IAM) solutions to combine the best of both worlds. Moreover, they require customizable, secure, and scalable products if they are to effectively build agile and extensible CIAM solutions to delight their customers.

The technologies, capabilities, and solutions needed to benefit from the trends presented above are crucial in assisting organizations to differentiate. However, they must also sit on top of a reliable and flexible identity platform that meets the variety of use cases a company will have today and ensure it is future-proof for tomorrow. These factors will have a profound impact on how businesses build, manage, and maintain relationships in 2021 and in the years to come.

KEYWORDS: cyber security identity (ID) management risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Prabath Siriwardena (@prabath) is the vice president and deputy CTO of security architecture at WSO2. He has over 13 years of industry experience and currently provides security architecture solutions to many of WSO2’s key customers. He has spoken at several global user conferences including RSA Conference, Identiverse, ApacheCon, OSCON, QCon, WSO2Con, and European Identity Conference, among others. Prabath has also authored seven books including Microservices Security in Action, Microservices for the Enterprise, and Advanced API Security.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0719-Privacy-Feat-slide1_900px

    Three security trends to watch in 2021 and beyond

    See More
  • Three Key Learnings for CEOs from Last Month's ASUS Hack

    See More
  • Data privacy and considerations

    Three critical data strategies for surviving 2021

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing