{"id":2267,"date":"2026-01-29T16:21:43","date_gmt":"2026-01-29T16:21:43","guid":{"rendered":"https:\/\/www.strategymrc.com\/blog\/?p=2267"},"modified":"2026-02-04T07:23:25","modified_gmt":"2026-02-04T07:23:25","slug":"top-ciam-software-solutions","status":"publish","type":"post","link":"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/","title":{"rendered":"Top 5 CIAM Software &#038; Solutions Powering Secure Digital Customer Experiences"},"content":{"rendered":"\n<p>As digital businesses scale, managing customer identities securely and seamlessly has become a critical priority. From e-commerce and fintech to healthcare and SaaS platforms, organizations now handle millions of customer identities across apps, devices, and geographies.<\/p>\n\n\n\n<p>This is where Customer Identity and Access Management (CIAM) software plays a central role.<\/p>\n\n\n\n<p>CIAM platforms go beyond basic login systems. They enable secure authentication, protect customer data, support regulatory compliance, and deliver frictionless digital experiences\u2014all while scaling to millions of users.<\/p>\n\n\n\n<p>In this blog, we explore five leading CIAM software &amp; solutions shaping the future of secure, customer-centric digital ecosystems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:24px\">What Is CIAM and Why It Matters<\/h2>\n\n\n\n<p>Customer Identity and Access Management (CIAM) focuses on managing external user identities-customers, partners, and subscribers-rather than internal employees.<\/p>\n\n\n\n<p>Modern CIAM solutions help organizations:<\/p>\n\n\n\n<ul>\n<li>Secure customer data at scale<\/li>\n\n\n\n<li>Enable seamless sign-up and login experiences<\/li>\n\n\n\n<li>Support social logins, MFA, and passwordless authentication<\/li>\n\n\n\n<li>Meet privacy regulations like GDPR, CCPA, and HIPAA<\/li>\n\n\n\n<li>Personalize user journeys without compromising security<\/li>\n<\/ul>\n\n\n\n<p>As digital touchpoints multiply, CIAM has become a core infrastructure layer for customer trust and business growth.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Capabilities of Modern CIAM Platforms<\/h2>\n\n\n\n<p>Leading CIAM solutions typically offer:<\/p>\n\n\n\n<ul>\n<li><strong>User Registration &amp; Profile Management<\/strong><\/li>\n\n\n\n<li><strong>Single Sign-On (SSO)<\/strong><\/li>\n\n\n\n<li><strong>Multi-Factor &amp; Passwordless Authentication<\/strong><\/li>\n\n\n\n<li><strong>Consent &amp; Privacy Management<\/strong><\/li>\n\n\n\n<li><strong>API-First and Cloud-Native Architecture<\/strong><\/li>\n\n\n\n<li><strong>Scalability for Millions of Identities<\/strong><\/li>\n\n\n\n<li><strong>Advanced Security &amp; Fraud Detection<\/strong><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:24px\">Top 5 CIAM Software &amp; Solutions<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"font-size:20px\">1. Okta Customer Identity Cloud (Auth0)<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"104\" src=\"https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2026\/01\/image.png\" alt=\"\" class=\"wp-image-2269\" style=\"width:179px;height:auto\" srcset=\"https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2026\/01\/image.png 300w, https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2026\/01\/image-150x52.png 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure>\n\n\n\n<p>Best for developer-first, scalable identity management<\/p>\n\n\n\n<p>Okta\u2019s Customer Identity Cloud (formerly Auth0) is one of the most widely adopted CIAM platforms globally. It is known for its flexibility, robust APIs, and fast implementation.<\/p>\n\n\n\n<p><strong>Key strengths:<\/strong><\/p>\n\n\n\n<ul>\n<li>Developer-friendly SDKs and APIs<\/li>\n\n\n\n<li>Passwordless authentication and MFA<\/li>\n\n\n\n<li>Social login and enterprise federation<\/li>\n\n\n\n<li>High scalability for consumer applications<\/li>\n<\/ul>\n\n\n\n<p><strong>Ideal for:<\/strong><br>SaaS companies, startups, and enterprises building modern digital products at scale.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:24px\">2. Ping Identity (PingOne for Customers)<\/h2>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img decoding=\"async\" src=\"https:\/\/www.pingidentity.com\/content\/dam\/picr\/nav\/Ping-Logo-2.svg\" alt=\"Ping Identity Logo\" style=\"width:409px;height:auto\"\/><\/figure>\n\n\n\n<p><strong>Best for large enterprises with complex security needs<\/strong><\/p>\n\n\n\n<p>Ping Identity delivers enterprise-grade CIAM with strong emphasis on security, compliance, and hybrid deployments.<\/p>\n\n\n\n<p><strong>Key strengths:<\/strong><\/p>\n\n\n\n<ul>\n<li>Advanced authentication and access policies<\/li>\n\n\n\n<li>Strong IAM + CIAM convergence<\/li>\n\n\n\n<li>On-premise and cloud flexibility<\/li>\n\n\n\n<li>Zero-trust and risk-based authentication<\/li>\n<\/ul>\n\n\n\n<p><strong>Ideal for:<\/strong><br>Large enterprises in finance, healthcare, telecom, and regulated industries.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:24px\">3. ForgeRock (Thales Group)<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"220\" height=\"49\" src=\"https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2026\/01\/image-1.png\" alt=\"\" class=\"wp-image-2271\" srcset=\"https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2026\/01\/image-1.png 220w, https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2026\/01\/image-1-150x33.png 150w\" sizes=\"(max-width: 220px) 100vw, 220px\" \/><\/figure>\n\n\n\n<p>Best for AI-driven and adaptive identity journeys<\/p>\n\n\n\n<p>ForgeRock offers a powerful CIAM platform focused on intelligent, contextual identity management across channels and devices.<\/p>\n\n\n\n<p><strong>Key strengths:<\/strong><\/p>\n\n\n\n<ul>\n<li>AI-driven identity orchestration<\/li>\n\n\n\n<li>Customer journey flows and adaptive authentication<\/li>\n\n\n\n<li>Strong support for IoT and omnichannel use cases<\/li>\n\n\n\n<li>Enterprise-scale performance<\/li>\n<\/ul>\n\n\n\n<p><strong>Ideal for:<\/strong><br>Organizations managing complex customer ecosystems and connected devices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Microsoft Entra External ID (formerly Azure AD B2C)<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"276\" height=\"86\" src=\"https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2026\/01\/image-2.png\" alt=\"\" class=\"wp-image-2272\" style=\"width:206px;height:auto\" srcset=\"https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2026\/01\/image-2.png 276w, https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2026\/01\/image-2-150x47.png 150w\" sizes=\"(max-width: 276px) 100vw, 276px\" \/><\/figure>\n\n\n\n<p><strong>Best for Microsoft-centric digital ecosystems<\/strong><\/p>\n\n\n\n<p>Microsoft Entra External ID provides CIAM capabilities deeply integrated with Azure cloud services and Microsoft security stack.<\/p>\n\n\n\n<p><strong>Key strengths:<\/strong><\/p>\n\n\n\n<ul>\n<li>Seamless integration with Azure and Microsoft services<\/li>\n\n\n\n<li>High availability and global scalability<\/li>\n\n\n\n<li>Built-in compliance and security controls<\/li>\n\n\n\n<li>Support for social identities and custom policies<\/li>\n<\/ul>\n\n\n\n<p><strong>Ideal for:<\/strong><br>Enterprises already invested in Microsoft Azure and cloud infrastructure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:24px\">5. SAP Customer Identity and Access Management<\/h2>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"190\" height=\"90\" src=\"https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2026\/01\/image-3.png\" alt=\"\" class=\"wp-image-2273\" style=\"width:194px;height:auto\" srcset=\"https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2026\/01\/image-3.png 190w, https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2026\/01\/image-3-150x71.png 150w\" sizes=\"(max-width: 190px) 100vw, 190px\" \/><\/figure>\n\n\n\n<p>Best for commerce and customer-data-driven enterprises<\/p>\n\n\n\n<p>SAP CIAM is designed to unify customer identity with consent, preference, and profile management\u2014especially for large consumer brands.<\/p>\n\n\n\n<p><strong>Key strengths:<\/strong><\/p>\n\n\n\n<ul>\n<li>Strong consent and privacy management<\/li>\n\n\n\n<li>Integration with SAP CX and ERP platforms<\/li>\n\n\n\n<li>Global compliance support<\/li>\n\n\n\n<li>Unified customer profile across channels<\/li>\n<\/ul>\n\n\n\n<p><strong>Ideal for:<\/strong><br>Retail, consumer goods, and enterprises running SAP-centric customer platforms.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:24px\">CIAM Market Trends Shaping the Future<\/h2>\n\n\n\n<p>The CIAM landscape is evolving rapidly due to:<\/p>\n\n\n\n<ul>\n<li><strong>Rising data privacy regulations<\/strong><\/li>\n\n\n\n<li><strong>Growth of passwordless authentication<\/strong><\/li>\n\n\n\n<li><strong>AI-driven fraud prevention<\/strong><\/li>\n\n\n\n<li><strong>Explosion of mobile and omnichannel users<\/strong><\/li>\n\n\n\n<li><strong>Demand for seamless yet secure customer experiences<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Organizations are increasingly prioritizing identity as a business enabler, not just a security layer.<\/p>\n\n\n\n<p>CIAM is no longer optional-it\u2019s foundational to digital trust, customer loyalty, and secure growth.<\/p>\n\n\n\n<p>The platforms highlighted above are leading the market by combining security, scalability, and customer experience. As businesses continue to digitize customer interactions, investing in the right CIAM solution will define long-term success.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As digital businesses scale, managing customer identities securely and seamlessly has become a critical priority. From e-commerce and fintech to healthcare and SaaS platforms, organizations now handle millions of customer identities across apps, devices, and geographies. This is where Customer Identity and Access Management (CIAM) software plays a central role. CIAM platforms go beyond basic [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top 5 CIAM Software &amp; Solutions for Secure Customer Identity Management<\/title>\n<meta name=\"description\" content=\"Discover the top 5 CIAM software &amp; solutions powering secure, scalable customer identity management. Compare leading CIAM platforms for digital businesses in 2026.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 5 CIAM Software &amp; Solutions for Secure Customer Identity Management\" \/>\n<meta property=\"og:description\" content=\"Discover the top 5 CIAM software &amp; solutions powering secure, scalable customer identity management. Compare leading CIAM platforms for digital businesses in 2026.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratistics MRC\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-29T16:21:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-04T07:23:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2026\/01\/image.png\" \/>\n<meta name=\"author\" content=\"Akash\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Akash\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/\"},\"author\":{\"name\":\"Akash\",\"@id\":\"https:\/\/www.strategymrc.com\/blog\/#\/schema\/person\/599a89cba7fe0a22404cf43445567bdf\"},\"headline\":\"Top 5 CIAM Software &#038; Solutions Powering Secure Digital Customer Experiences\",\"datePublished\":\"2026-01-29T16:21:43+00:00\",\"dateModified\":\"2026-02-04T07:23:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/\"},\"wordCount\":649,\"publisher\":{\"@id\":\"https:\/\/www.strategymrc.com\/blog\/#organization\"},\"articleSection\":[\"Blog\"],\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/\",\"url\":\"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/\",\"name\":\"Top 5 CIAM Software & Solutions for Secure Customer Identity Management\",\"isPartOf\":{\"@id\":\"https:\/\/www.strategymrc.com\/blog\/#website\"},\"datePublished\":\"2026-01-29T16:21:43+00:00\",\"dateModified\":\"2026-02-04T07:23:25+00:00\",\"description\":\"Discover the top 5 CIAM software & solutions powering secure, scalable customer identity management. Compare leading CIAM platforms for digital businesses in 2026.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.strategymrc.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 5 CIAM Software &#038; Solutions Powering Secure Digital Customer Experiences\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.strategymrc.com\/blog\/#website\",\"url\":\"https:\/\/www.strategymrc.com\/blog\/\",\"name\":\"Stratistics MRC\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.strategymrc.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.strategymrc.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.strategymrc.com\/blog\/#organization\",\"name\":\"Stratistics MRC\",\"url\":\"https:\/\/www.strategymrc.com\/blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.strategymrc.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2022\/08\/smrc-logo-sm.png\",\"contentUrl\":\"https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2022\/08\/smrc-logo-sm.png\",\"width\":150,\"height\":38,\"caption\":\"Stratistics MRC\"},\"image\":{\"@id\":\"https:\/\/www.strategymrc.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.strategymrc.com\/blog\/#\/schema\/person\/599a89cba7fe0a22404cf43445567bdf\",\"name\":\"Akash\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.strategymrc.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ef8cf3725231b15449bb719267bbb94f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ef8cf3725231b15449bb719267bbb94f?s=96&d=mm&r=g\",\"caption\":\"Akash\"},\"url\":\"https:\/\/www.strategymrc.com\/blog\/author\/akash\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 5 CIAM Software & Solutions for Secure Customer Identity Management","description":"Discover the top 5 CIAM software & solutions powering secure, scalable customer identity management. Compare leading CIAM platforms for digital businesses in 2026.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Top 5 CIAM Software & Solutions for Secure Customer Identity Management","og_description":"Discover the top 5 CIAM software & solutions powering secure, scalable customer identity management. Compare leading CIAM platforms for digital businesses in 2026.","og_url":"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/","og_site_name":"Stratistics MRC","article_published_time":"2026-01-29T16:21:43+00:00","article_modified_time":"2026-02-04T07:23:25+00:00","og_image":[{"url":"https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2026\/01\/image.png"}],"author":"Akash","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Akash","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/#article","isPartOf":{"@id":"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/"},"author":{"name":"Akash","@id":"https:\/\/www.strategymrc.com\/blog\/#\/schema\/person\/599a89cba7fe0a22404cf43445567bdf"},"headline":"Top 5 CIAM Software &#038; Solutions Powering Secure Digital Customer Experiences","datePublished":"2026-01-29T16:21:43+00:00","dateModified":"2026-02-04T07:23:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/"},"wordCount":649,"publisher":{"@id":"https:\/\/www.strategymrc.com\/blog\/#organization"},"articleSection":["Blog"],"inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/","url":"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/","name":"Top 5 CIAM Software & Solutions for Secure Customer Identity Management","isPartOf":{"@id":"https:\/\/www.strategymrc.com\/blog\/#website"},"datePublished":"2026-01-29T16:21:43+00:00","dateModified":"2026-02-04T07:23:25+00:00","description":"Discover the top 5 CIAM software & solutions powering secure, scalable customer identity management. Compare leading CIAM platforms for digital businesses in 2026.","breadcrumb":{"@id":"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.strategymrc.com\/blog\/top-ciam-software-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.strategymrc.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Top 5 CIAM Software &#038; Solutions Powering Secure Digital Customer Experiences"}]},{"@type":"WebSite","@id":"https:\/\/www.strategymrc.com\/blog\/#website","url":"https:\/\/www.strategymrc.com\/blog\/","name":"Stratistics MRC","description":"","publisher":{"@id":"https:\/\/www.strategymrc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.strategymrc.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/www.strategymrc.com\/blog\/#organization","name":"Stratistics MRC","url":"https:\/\/www.strategymrc.com\/blog\/","sameAs":[],"logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.strategymrc.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2022\/08\/smrc-logo-sm.png","contentUrl":"https:\/\/www.strategymrc.com\/blog\/wp-content\/uploads\/2022\/08\/smrc-logo-sm.png","width":150,"height":38,"caption":"Stratistics MRC"},"image":{"@id":"https:\/\/www.strategymrc.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.strategymrc.com\/blog\/#\/schema\/person\/599a89cba7fe0a22404cf43445567bdf","name":"Akash","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.strategymrc.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ef8cf3725231b15449bb719267bbb94f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ef8cf3725231b15449bb719267bbb94f?s=96&d=mm&r=g","caption":"Akash"},"url":"https:\/\/www.strategymrc.com\/blog\/author\/akash\/"}]}},"_links":{"self":[{"href":"https:\/\/www.strategymrc.com\/blog\/wp-json\/wp\/v2\/posts\/2267"}],"collection":[{"href":"https:\/\/www.strategymrc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.strategymrc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.strategymrc.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.strategymrc.com\/blog\/wp-json\/wp\/v2\/comments?post=2267"}],"version-history":[{"count":3,"href":"https:\/\/www.strategymrc.com\/blog\/wp-json\/wp\/v2\/posts\/2267\/revisions"}],"predecessor-version":[{"id":2286,"href":"https:\/\/www.strategymrc.com\/blog\/wp-json\/wp\/v2\/posts\/2267\/revisions\/2286"}],"wp:attachment":[{"href":"https:\/\/www.strategymrc.com\/blog\/wp-json\/wp\/v2\/media?parent=2267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.strategymrc.com\/blog\/wp-json\/wp\/v2\/categories?post=2267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.strategymrc.com\/blog\/wp-json\/wp\/v2\/tags?post=2267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}