Fight Financial Crime With Effective Customer Identity and Access Management
Use advanced capabilities to assure identity and prevent financial crime.
Speak With A Representative
Request Content Access
Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.
- Technology-driven financial crime is exploding. Your financial organization’s solutions are no longer able to adequately protect customer identity.
- Many existing knowledge-based identity verification capabilities are no longer adequate to assure customer authenticity.
- You need to ensure enhanced security with elevated (customer identity and access management) CIAM capabilities such as multifactor or possession-based authentication, but these approaches are no longer enough.
- Your organization needs to undertake a full modernization of your CIAM capabilities to meet the current challenges and to prepare for emerging challenges and you are not sure what to look for.
Our Advice
Critical Insight
Modernizing an internally developed CIAM solution that you hope will address the current threat environment isn’t the best solution.
The CIAM vendor marketplace is rapidly evolving, and you are struggling to understand the complex offering, which is hampering your ability to choose a new vendor that will meet your current and future needs.
CIAM will play a strategic role as your organization adopts open banking services. You and your team must learn more about open banking and the dramatic impact that it is going to have on your CIAM capabilities.
Impact and Result
Info-Tech Research Group has assessed the CIAM marketplace and selected a cross-section of vendors to accelerate your learning.
You will understand how choosing the right CIAM solutions will elevate your security and help reduce financial crime.
Info-Tech will:
- Provide an overview of the current state of many organization’s CIAM capabilities.
- Explore the current challenges that are driving the need for change in CIAM capabilities.
- Provide an overview of the key capabilities that your new CIAM solution should deliver.
- Provide a detailed evaluation of the key CIAM players and rank their capabilities.
Fight Financial Crime With Effective Customer Identity and Access Management Research & Tools
1. Fight Financial Crime With Effective Customer Identity and Access Management Storyboard – Understand how customer identity and access management can be used to reduce financial crimes.
The rapid growth of AI has powered a new wave of crime that has elevated the threats that financial institutions are trying to combat. Among the most challenging is establishing and continually verifying who are legitimate customers and who are technology-savvy criminals.
Many approaches are being used to fight financial crime, but customer identity and access management (CIAM) has emerged as one of the best solutions to the challenges presented by technology-based financial crimes.
2. Customer Identity and Access Management Selection Tool – A vendor evaluation tool for customer identity and access management systems using 12 criteria for 12 vendors.
The customer identity and access management vendor evaluation will help your organization to select the best solution based on your 12 most important criteria. It can evaluate up to 12 vendors and it will rank the vendors (and highlight the top 3) based on your weightings of each criteria.
Speak With A Representative
Request Content Access
Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.

Upcoming
Industry Roundtable

Tuesday, May 06, 2025
02:30 PM EDT
Fight Financial Crime With Robust Customer Identity & Access Management
Register NowFight Financial Crime With Effective Customer Identity and Access Management
Use advanced capabilities to assure identity and prevent financial crime.
Analyst Perspective
There is more to CIAM than fighting financial crime.

The rapid growth of AI has powered a new wave of crime that has elevated the threats that financial institutions are trying to combat. Among the most challenging is establishing and continually verifying who are legitimate customers and who are technology-savvy criminals.
Many approaches are being used to fight financial crime, but customer identity and access management (CIAM) has emerged as one of the best solutions to the challenges presented by technology-based financial crimes.
Many financial institutions are still using basic security features based on unique knowledge, otherwise known as passwords or pin codes, to verify their customer’s identity. These basic techniques are no longer adequate to protect financial institutions and their customers from sophisticated criminals.
Implementing advanced CIAM capabilities is increasingly moving toward vendor-based solutions. Choosing the right vendor is now becoming a top priority to assure your organization is adequately protected.
Concurrently, modern CIAM solutions are also playing a critical strategic role as a central enabler of open banking, which is reaching an inflection point. As customers begin to be serviced by organizations outside of your organization, the role of CIAM is becoming an important capability enabling the future of federated financial services delivery.
David Tomljenovic MBA LL.M CIM
Head of Financial Service Industry Research
Info-Tech Research Group
Executive Summary
Your ChallengeTechnology-driven financial crime is exploding. Your financial organization’s solutions are no long able to adequately protect customer identity. Many existing knowledge-based identity verification capabilities are no longer adequate to assure customer authenticity. You need to ensure enhanced security with elevated CIAM capabilities such as multifactor or possession-based authentication, but these approaches are no longer enough. Your organization needs to undertake a full modernization of your CIAM capabilities to meet the current challenges and to prepare for emerging challenges and you are not sure what to look for. |
Common ObstaclesModernizing an internally developed CIAM solution that you hope will address the current threat environment isn’t the best approach. The CIAM vendor marketplace is rapidly evolving, and you are struggling to understand the complex offering, which is hampering your ability to choose a new vendor that will meet your current and future needs. CIAM will play a strategic role as your organization adopts open banking services. You and your team must learn more about open banking and the dramatic impact it is going to have on your CIAM capabilities. |
Info-Tech ApproachInfo-Tech Research Group has assessed the CIAM marketplace and selected a cross-section of vendors to accelerate your learning. Explain how choosing the right CIAM solutions will elevate your security and help reduce financial crime. Info-Tech will:
|
Modern CIAM solutions combine multiple technologies that add layers of protection to assure customer identities can be accurately authenticated. CIAM solutions must develop and deploy AI and ML-based capabilities that counteract criminal use of AI/ML.
Identity-based fraud is an expensive and growing challenge for the financial industry
“Traditional security systems seem to be no match for sophisticated identity fraudsters.”1
Advanced technologies such as AI are increasing identity-related losses.
Identity fraud will cost banks U$30 billion by 2030 1 according to a recent survey by Deloitte Center For Financial Services.
According to the FTC, identity fraud is up 47% year-over-year.4 In the same study, every 22 seconds there is a new victim of identity fraud in the US, and it cost banks US$10.2 billion.4
85% of synthetic identity fraud is not being detected by currently installed systems according to Lexus Nexus.1
Identity fraud in banks was up 34% in the first six months of 2024, and the number of identity-related fraud cases increased to 552,000 over the same six-month period.3
Loan and lease fraud increased by 20% to approximately 96,000 cases in the first six months of 2024.3
Identity-related breaches are high
84%
of respondents said their company experienced an ID related breach in the last year.2
Sources:
1. Deloitte Insights, “Using biometrics to fight back against synthetic identity fraud,” 2023;
2. Ping Identity, “State of Identity 2023: A Pivotal Time in Customer Identity”;
3. ebankIT, 2024; 4. Ping Identity, “Transformative approaches to reduce identity fraud in banking,” 2024
Customer identity and access management (CIAM) systems are a primary defense against identity-based fraud
CIAM systems employ a broad range of capabilities and techniques to reduce fraud.
A new generation of vendor-provided CIAM systems are emerging that employ multiple techniques to identify valid identities from false or synthetically generated ones.
New CIAM techniques include:
- Multifactor authentication where varying levels and techniques are used to authenticate a user's ID.
- Physical biometrics such as fingerprints, eye scans, and facial and voice recognition.
- Behavioral biometrics using multiple data sources to detect unusual behavior patterns.
- Advance risk assessments that consider a broad set of data points such as IP addresses, device ID, location, and social media activity to determine risk context.
Behavioral biometric use is expected to increase and will rely on patterns of behavior that will be captured over time, analyzed by machine learning or AI tools, and become another metric that will be considered.
Progressive authentication is context aware and dynamically adjusts itself. As customers move through their journey with a financial institution, the level of authentication increases.
Layered authentication techniques are being employed. Each level presents more robust authentication requirements.
MFA is being widely adopted
89%
of respondents say they have adopted MFA to strengthen ID security.1
Source: 1. Ping Identity, “Transforming Your Customer Identity Strategy into a Profit Center,” 2023
CIAM solutions must accommodate all customers
As your relationship with your customers evolves, so must your fraud solution.
Your organization has different types of customers with differing requirements.
Existing customers:
- Your fraud system’s primary purpose is to capture essential identity data. It will also connect their identity data to the core systems of your organization.
- The movement of data between your fraud system and core systems is essential to enable progressively deeper multifactor authentication as your customer engages more deeply.
Potential new customers:
- Low friction customer marketing/acquisition will reduce customer frustration with your fraud solutions and onboarding processes.
- Progressive onboarding enables sales by collecting enough information to engage your customers while deeper information is collected as engagement deepens.
External partners:
- Potential product or service delivery partners are also considered “customers” within the context of your fraud system as they also require authentication.
- Federated service delivery is enabled through standard protocols, such as SAML, OpenID, and Oauth, which are how open banking capabilities can be delivered.
Info-Tech Insight
The goal of a modern CIAM solution is to provide a system that delivers an optimal balance between protection for a financial institution and its customers while still offering ease of use to customers.
The implementation of modern CIAM systems has become a strategic priority
Financial organizations are dedicating time and resources to CIAM transformation.
Many organization’s CIAM systems are out of date and are not effective in preventing fraud.
- Many financial organizations have internally built CIAM solutions that have become outdated because of new technology-based threats.
- 76% of survey respondents said preventing ID fraud is their top priority.1
- 90% of organizations are using a CIAM vendor to meet their needs.1
CIAM systems are viewed as strategic enablers of growth and new business capabilities.
- Banks have experienced a 60% reduction in time required to implement open banking.2
- Banks using modern CIAM solution have seen a 300% increase in customer engagement.2
Info-Tech Insight
As you begin to evaluate CIAM solutions, it is important to consider more advanced use cases than your organization may be currently considering. By doing so, you can ensure that your choice of systems will be able to grow with your organization as it grows in size, capabilities, and digital maturity.
Sources:
1. Ping Identity, “State of Identity 2023: A Pivotal Time in Customer Identity“
2. Ping Identity, “Transforming Your Customer Identity Strategy into a Profit Center”

IAM is often confused with CIAM
They share similarities but their orientation and functionality are very different.
Identity and Access Management (IAM)
- IAM systems are an integral part of internal systems’ provisioning and security.
- Account creation and identity verification are less rigorous because they are done by internal sources.
- The number of users or identities is typically smaller and limited.
- The levels of authentication are simplified because of the trusted nature of a user’s identity.
Customer Identity and Access Management (CIAM)
- CIAM systems are focused on external identities and must protect both the users and the organization.
- Account creation and identity verification is very complex because customers are unknown and external.
- The system must be highly scalable to accommodate a potentially unlimited number of users.
- Authentication capabilities must be extensive because users are external and unknown to the organization, and the organization is responsible for protecting itself and its customers.
Info-Tech Insight
Many organizations believe that their current IAM capabilities are suitable for external use with customers. In fact, the trend in the marketplace is to use separate systems for IAM and CIAM applications.
IAM and CIAM are increasingly separate systems
It is important to understand the key differences between IAM and CIAM.
Function |
Identity and Access Management (IAM) |
Customer Identity and Access Management (CIAM) |
Identity Purpose |
Oversee known employee or contractor identities within an organization. | Oversee customer identities across digital, multichannel platforms (web, mobile, IoT). |
Identity Registration |
Users are registered by their organization, with key profile information provided by HR or IT. | Users self-register and create their own personalized data. |
Identity Source |
Users are recognized and controlled: employees, contractors, and partners. Their identity may be assumed. | Users are unknown until registration and may create multiple or fraudulent accounts. Their identity cannot be assumed. |
System Scale |
Scalable from tens to hundreds of thousands of users, each with a unique identity. | Scalable to hundreds of millions of users, with the capacity to manage billions of consumer identities. |
Identity Location |
A single, centralized identity provider (IdP). | Multiple decentralized identity providers: social logins via Facebook, Google, and LinkedIn, alongside traditional login methods. |
System Location |
A variety of heterogeneous IT systems, all within a closed, corporate network. | A variety of heterogeneous IT systems, operating on public networks (internet). |
Identity Data Use |
Employee profile data is gathered for administrative and operational needs. | Customer profile data is collected for essential business purposes, such as transactions, marketing, personalization, analytics, and business intelligence. |
Identity Data Management |
Personal data, user privacy, preferences, and consent are managed solely within a tightly controlled, homogeneous corporate environment. | Personal data is handled in accordance with a wide range of privacy and data protection regulations, which require providing users the ability to view, modify, and revoke their preference and consent settings. |
Source: LinkedIn, “Key distinctions between IAM and CIAM

Upcoming
Industry Roundtable

Tuesday, May 06, 2025
02:30 PM EDT
Fight Financial Crime With Robust Customer Identity & Access Management
Register Now
David
Tomljenovic
Research Director

Christine
West
Managing Partner
Email Infographic
About Info-Tech
Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.
We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.
What Is a Blueprint?
A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.
Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.
Talk to an Analyst
Our analyst calls are focused on helping our members use the research we produce, and our experts will guide you to successful project completion.
Book an Analyst Call on This Topic
You can start as early as tomorrow morning. Our analysts will explain the process during your first call.
Get Advice From a Subject Matter Expert
Each call will focus on explaining the material and helping you to plan your project, interpret and analyze the results of each project step, and set the direction for your next project step.
Unlock Sample ResearchAuthor
David Tomljenovic
Unlock Fight Financial Crime With Effective Customer Identity and Access Management
Get Instant Access
Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.
This content is exclusive to members.
Get instant access by signing up!
Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.
Search Code: 107127
Last Revised: March 25, 2025
Book an Appointment
IT Research & Advisory Services
Our systems detected an issue with your IP. If you think this is an error please submit your concerns via our contact form.