Our Blog

What are you searching for?

Kanna-Linh

New Trend Alert: Why Are More Companies Outsourcing Their Database Management?

You might be wondering where all the data you save in your branded customer account goes, well the answer is here. Many companies manage their database themselves but there comes a time when this database is too big to b...

SECURITY

ReachFive

Mitigating the impact of credential stuffing attacks

The Rise of Credential Stuffing Attacks and Online Privacy Concerns Th...

REACHFIVE

ReachFive

End of third-party cookies (2/3): The 3 challenges for marketers

Cookies will soon be a thing of the past. Following suit with Apple an...

REACHFIVE

ReachFive

End of third-party cookies (episode 1 of 3): what’s the impact on your...

GDPR came into force in 2018, being universally feared by digital, mar...

CUSTOMER

Christophe Verdenne

Customer knowledge and hyper-personalization: helping CDPs reach their...

Faced with a multiplicity of channels to be activated, ever growing co...

RGPD

Stéphane Petitcolas

GDPR, CCPA, and other regulations... how are companies managing multi-...

The General Data Protection Regulation (GDPR) imposes obligations in t...

DATA PRIVACY

Pierre Bar

CIAM: How to Manage Credential Stuffing Attacks

The growing use of e-commerce in recent months, following lockdowns an...

COMMERCE

Cyril Scelles

E-commerce Platform Migration: Acceleration, Success, and CIAM

Technology is evolving quickly and new consumer habits are being creat...

Sorayah Banomyong

Customer data processing in 2020: trends and opportunities

The need to comply with GDPR is acknowledged and addressed by most com...

AUTHENTICATION

Guillaume Partenet

Authentication: a whole new field of possibilities with biometrics

Unlocking your smartphone with a fingerprint or via a facial recogniti...

Interested to learn more about ReachFive?

Whatever you need - business cases, best practices, product presentation... our team of experts is happy to help you.

TALK TO AN EXPERT