Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Three key customer IAM trends for 2021

Looking ahead to 2021, the pandemic will continue to drive business interactions with consumers online. Customer identity and access management (CIAM) products should see explosive growth as these technologies will be essential for securing digital storefronts and providing enhanced experiences.

By Prabath Siriwardena
SEC0820-Data-Feat-slide1_900px.jpg
December 17, 2020

The recent constraints on physical businesses have pushed organizations to accelerate plans to move operations to the digital world, often shrinking timelines from years to months. Within this context, the dependence on online commerce has increased significantly, and new sales models are blossoming. Global e-commerce sales are expected to top USD 4.2 trillion in 2020 and reach more than USD 6.5 trillion by 2023, explained in an article by e-commerce giant Shopify. Companies across all sectors—such as those in banking, retail, healthcare, public, education, transportation and logistics, energy and utilities, and manufacturing—are increasingly leveraging the Internet to provide necessary products and services to consumers.

However, as organizations pivot to digital infrastructures, they increasingly face challenges and tension as the need to ensure customer trust and privacy pull against the importance of providing exceptional user experiences across all touchpoints. A strong security and CIAM strategy will be essential to address these needs and ensure that information remains protected against outside threats.

Today, identity has become the glue for all contextual marketing. The main objective of CIAM is to drive revenue growth by leveraging identity data to acquire and retain consumers. It helps to build an identity-centric ecosystem to nurture an anonymous website visitor into a well-known, loyal customer. The CIAM market is unsaturated and growing, and according to Markets and Markets, it is projected to expand from USD 7.6 billion in 2020 to USD 15.3 billion by 2025, at a compound annual growth rate of 15.1%.

The future of business has changed drastically due to the rapid advancement of the remote work era from the pandemic. Here are three key CIAM market trends that security professionals should be aware of as they finalize their 2021 plans.

 

Growing adoption of digital strategies drives demand for CIAM

COVID-19 has pushed a wide range of businesses that were not previously digitally driven, such as grocery stores and restaurants, to offer goods and services online. Such businesses are now forced to adopt digital strategies to survive and thrive. However, this also opens up entirely new opportunities. Where these businesses once largely maintained transactional relationships with customers, they can now start to use knowledge about consumer identities to build customer profiles, new partnerships, and new services that drive longer-term and higher-value relationships for the business and the customer alike. This imperative will drive demand for high-performance, cost-effective CIAM solutions as businesses seek to focus on their core strengths rather than developing proprietary systems on their own.

 

Providing customers control over their data is key

The pandemic ushered in growing demand for giving consumers control over the information they want access to or shared, most notably regulations around open healthcare. This puts ‘identity’ front and center. Businesses must know who’s who, and who can have access to what in the digital world. At the same time, it’s critical to offer an effortless and seamless experience that minimizes any barriers to consumers interacting online. 

Maintaining this delicate balance leads to another vital requirement: self-service. Customers should be able to update and review their privacy preferences, such as using different emails for different activities, changing associated profile information, and updating contact information. At the same time, users should be able to adjust their security profiles by configuring recovery mechanisms and registering trusted devices for login. With the advancement of privacy regulations across the world, modern businesses must also give users data portability and the ability to deregister. CIAM solutions help to give consumers control over their data and keep it safe while creating positive user experiences and customer insights that help businesses increase revenue and growth.

 

Keeping data private is a necessity

Privacy will no longer be a luxury but a necessity, and businesses will need to secure consumer data more so than ever before as failure to do so will impact a company’s reputation, stock, and sale price. With regulations, such as the California Consumer Privacy Act (CCPA) and General Data Protection Regulation (GDPR) coming into effect—and various other privacy laws making their way through legislatures—allowing users to control their data and safeguarding privacy has become vital.

Customers now expect businesses to reveal what information they gather, delete data if requested, and explicitly ask for consent to save and share data. As developer-friendly CIAM platforms continue to evolve in 2021 (e.g., to further support areas like artificial intelligence, automation, and advanced authentication), so must the adoption of these platforms by businesses to ensure that customers are protected at all times.

In the past, businesses have been faced with an unenviable decision: either build a custom identity solution from scratch, which can be time-consuming and leave gaps in security, or purchase a pre-defined offering that compromises the user experience. However, faced with uncompromising data regulations and growing consumer expectations, businesses need to go beyond traditional identity and access management (IAM) solutions to combine the best of both worlds. Moreover, they require customizable, secure, and scalable products if they are to effectively build agile and extensible CIAM solutions to delight their customers.

The technologies, capabilities, and solutions needed to benefit from the trends presented above are crucial in assisting organizations to differentiate. However, they must also sit on top of a reliable and flexible identity platform that meets the variety of use cases a company will have today and ensure it is future-proof for tomorrow. These factors will have a profound impact on how businesses build, manage, and maintain relationships in 2021 and in the years to come.

KEYWORDS: cyber security identity (ID) management risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Prabath Siriwardena (@prabath) is the vice president and deputy CTO of security architecture at WSO2. He has over 13 years of industry experience and currently provides security architecture solutions to many of WSO2’s key customers. He has spoken at several global user conferences including RSA Conference, Identiverse, ApacheCon, OSCON, QCon, WSO2Con, and European Identity Conference, among others. Prabath has also authored seven books including Microservices Security in Action, Microservices for the Enterprise, and Advanced API Security.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0719-Privacy-Feat-slide1_900px

    Three security trends to watch in 2021 and beyond

    See More
  • hacking_enews

    Three Key Learnings for CEOs from Last Month's ASUS Hack

    See More
  • biometrics facial recognition

    AI and biometrics in 2021: Predictions, trends, and insights for what might lie ahead

    See More

Events

View AllSubmit An Event
  • November 14, 2024

    Best Practices for Integrating AI Responsibly

    ON DEMAND: Discover how artificial intelligence is reshaping the business landscape. AI holds immense potential to revolutionize industries, but with it comes complex questions about its risks and rewards.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing