DATA SHEET
Customer Identity and Access Management (cIAM)
and traditional IAM — while rooted in the same
technologies — are not the same. cIAM demands a
new set of rules and expectations. Gigya’s Customer
Identity Management Platform offers a more intelligent
and efficient way to collect and organize your customer
data, so you can make better-informed decisions and
maximize the value of your data.
Collect And Manage
All of the data.
The heart of Gigya’s cIAM Platform is our dynamic schema database
— built to handle the endless variety and ever-increasing scale of
incoming customer data. Gigya manages and consolidates all of
your permission-based profile and behavioral data — structured and
unstructured — creating a unified customer view that you can access
via console reporting tools or directly through the API. Full indexing
maximizes the breadth of queries you can run. Your customer data is
normalized and always retrievable.
None of the hassle.
All of this flexibility and power is implemented with a single API
that connects to more than 35 social networks and third-party
identity providers (IdPs). All kinds of socially connected data can be
seamlessly collected and managed: shares, comments, likes, clicks,
tags, text analytics and so on. Gigya takes care of all API and privacy
compliance updates, so you can focus on growth and innovation.
Pre-Built Integrations
Hit the ground running.
Gigya’s IDX Marketplace gives you instant access to more than
55 pre-built integrations with a who’s-who of marketing platform
heavyweights. We partner with a growing range of leading
Put the Power of Gigya’s Customer Identity
Management Platform to Work for You
THE NATURE OF
IDENTITY IS CHANGING
...NOT ONLY CAN WE
IDENTIFY AND UNDERSTAND
OUR CUSTOMERS, BUT WE
CAN TAKE THIS DATA TO DRIVE
RELATIONSHIPS, RETENTION
AND ULTIMATELY REVENUE
ACROSS CHANNELS.
Max Goijarts
Technology and CX Manager
at Nutricia-Danone
GIGYA IDX MARKETPLACE
© 2015 Gigya, Inc.  |  2513 Charleston Road #200, Mountain View, CA 94043  |  T : (650) 353.7230  |  www.gigya.com
Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other
trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya’s services available
to our clients and their end users. Gigya acts as an agent or back-end vendor of its client’s website or mobile application, to which the end user of our client granted permissions (if applicable).
Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients’ direction. For more information, please see Gigya’s Privacy Policy, available
at http://www.gigya.com/privacy-policy/.
Rev: Gigya_Data_Sheet_IT_Overview_102015
technology partners to enable plug-and-play integration that saves
you time and money.
Gigya also employs generic data exchange services to simplify
swapping data with systems that don’t have integrations — like
central data warehouses — so you can count on a painless
implementation that maximizes your productivity.
Security
Cloud Performance — Grounded Security
Advanced security is built into the DNA of our platform. Gigya’s
proven, reliable performance within large-scale enterprise
environments is backed up with our ISO27001-certified standards
for our application security, data encryption, and transactional
authentication. Our advanced infrastructure ensures continuous
service and full disaster recovery. Additionally, Gigya maintains privacy
compliance with more than 35 social identity providers and adheres to
all regional regulations for data storage and transmission.
Safe at rest.
Gigya continually employs industry-standard protocols in every
step of development and administration to ensure security for your
data. PII and other sensitive information is automatically encrypted
and passwords are hashed. A two-factor authentication process,
along with a robust system of roles and permissions, gives site
administrators granular control over user access.
Safe in motion.
Data travels to and from Gigya servers via a secure channel . Critical
operation REST API calls — such as delete_user — must be signed
and made server-to-server only.
Stay in control.
Gigya gives you access to robust audit logging so you can track
transactional behavior, investigate errors, bugs and anomalies, and
keep your system running smoothly.
56% of surveyed IT
executives
SAVE OVER 50%
of their development time

Data Sheet: Gigya for the IT Buyer

  • 1.
    DATA SHEET Customer Identityand Access Management (cIAM) and traditional IAM — while rooted in the same technologies — are not the same. cIAM demands a new set of rules and expectations. Gigya’s Customer Identity Management Platform offers a more intelligent and efficient way to collect and organize your customer data, so you can make better-informed decisions and maximize the value of your data. Collect And Manage All of the data. The heart of Gigya’s cIAM Platform is our dynamic schema database — built to handle the endless variety and ever-increasing scale of incoming customer data. Gigya manages and consolidates all of your permission-based profile and behavioral data — structured and unstructured — creating a unified customer view that you can access via console reporting tools or directly through the API. Full indexing maximizes the breadth of queries you can run. Your customer data is normalized and always retrievable. None of the hassle. All of this flexibility and power is implemented with a single API that connects to more than 35 social networks and third-party identity providers (IdPs). All kinds of socially connected data can be seamlessly collected and managed: shares, comments, likes, clicks, tags, text analytics and so on. Gigya takes care of all API and privacy compliance updates, so you can focus on growth and innovation. Pre-Built Integrations Hit the ground running. Gigya’s IDX Marketplace gives you instant access to more than 55 pre-built integrations with a who’s-who of marketing platform heavyweights. We partner with a growing range of leading Put the Power of Gigya’s Customer Identity Management Platform to Work for You THE NATURE OF IDENTITY IS CHANGING ...NOT ONLY CAN WE IDENTIFY AND UNDERSTAND OUR CUSTOMERS, BUT WE CAN TAKE THIS DATA TO DRIVE RELATIONSHIPS, RETENTION AND ULTIMATELY REVENUE ACROSS CHANNELS. Max Goijarts Technology and CX Manager at Nutricia-Danone GIGYA IDX MARKETPLACE
  • 2.
    © 2015 Gigya,Inc.  |  2513 Charleston Road #200, Mountain View, CA 94043  |  T : (650) 353.7230  |  www.gigya.com Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya’s services available to our clients and their end users. Gigya acts as an agent or back-end vendor of its client’s website or mobile application, to which the end user of our client granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients’ direction. For more information, please see Gigya’s Privacy Policy, available at http://www.gigya.com/privacy-policy/. Rev: Gigya_Data_Sheet_IT_Overview_102015 technology partners to enable plug-and-play integration that saves you time and money. Gigya also employs generic data exchange services to simplify swapping data with systems that don’t have integrations — like central data warehouses — so you can count on a painless implementation that maximizes your productivity. Security Cloud Performance — Grounded Security Advanced security is built into the DNA of our platform. Gigya’s proven, reliable performance within large-scale enterprise environments is backed up with our ISO27001-certified standards for our application security, data encryption, and transactional authentication. Our advanced infrastructure ensures continuous service and full disaster recovery. Additionally, Gigya maintains privacy compliance with more than 35 social identity providers and adheres to all regional regulations for data storage and transmission. Safe at rest. Gigya continually employs industry-standard protocols in every step of development and administration to ensure security for your data. PII and other sensitive information is automatically encrypted and passwords are hashed. A two-factor authentication process, along with a robust system of roles and permissions, gives site administrators granular control over user access. Safe in motion. Data travels to and from Gigya servers via a secure channel . Critical operation REST API calls — such as delete_user — must be signed and made server-to-server only. Stay in control. Gigya gives you access to robust audit logging so you can track transactional behavior, investigate errors, bugs and anomalies, and keep your system running smoothly. 56% of surveyed IT executives SAVE OVER 50% of their development time