The State of Homegrown Auth Report

The 2025 State of Homegrown Authentication Report, sponsored by FusionAuth and Cloudelligent, provides the first deep dive into the tech stacks and team dynamics of organizations building their own identity systems. While many teams opt for in-house solutions for better security and customization, the data reveals significant risks, including the fact that 20% of respondents have experienced a security breach.

Key findings from this inaugural study of 144 IT practitioners include:

  • Architecture Trends: 67% of teams build their systems from scratch or roll their own auth server rather than using third-party providers.
  • The Tech Stack: Java, JavaScript, and C++ remain the top languages, with 72% of teams running auth in containerized or Kubernetes environments.
  • Productivity Benchmarks: Passport.js and Spring Security are rated as the top libraries for both long-term maintenance and initial time to value.
  • Team Composition: 60% of teams involve senior-level staff, yet only 23% of those contributors are considered identity specialists.
  • Infrastructure Preferences: Roughly half of development teams prefer local environments over SaaS tools for building and testing auth-related flows.

Download the full report to compare your own identity infrastructure against your peers and understand the features, protocols, and challenges shaping the future of custom authentication.

View Now

Why Passkeys Improve User Security

Passwords remain one of the biggest security liabilities in modern applications.

Phishing, credential reuse, and human error continue to drive the majority of data breaches—despite stronger password rules and added MFA layers. Passkeys offer a fundamentally more secure approach to authentication by removing passwords entirely.

This whitepaper explains how passkeys work, why they dramatically reduce common attack vectors, and what development and security teams need to know to implement them successfully.

In this guide, you’ll learn:

  • Why traditional passwords and MFA still fail against modern threats
  • How passkeys use public-key cryptography to prevent phishing and credential theft
  • The difference between passkeys and password-based authentication
  • Real-world examples of passkey adoption from leading platforms
  • Best practices and considerations for implementing passkeys

If you’re responsible for protecting user identities while maintaining a seamless login experience, this guide provides a clear roadmap to moving beyond passwords.

Download the whitepaper to learn how passkeys improve security—and how to put them into practice.

View Now

Why Trust FusionAuth

Modern applications demand authentication that is secure, flexible, and built for developers.

Yet many CIAM platforms introduce unnecessary complexity, opaque pricing, and architectural constraints that slow teams down and increase risk, especially in regulated environments.

This solution brief explains why thousands of engineering teams trust FusionAuth to power authentication at scale. Designed for full control and deployment flexibility, FusionAuth delivers a modern CIAM platform without vendor lock-in or multi-tenant compromises.

In this brief, you’ll learn:

  • Why traditional CIAM platforms limit flexibility, transparency, and security
  • How single-tenant architecture improves control, isolation, and compliance
  • What developer-first authentication looks like in practice
  • How teams migrate faster with minimal disruption and lower engineering effort

Whether you’re building for fintech, healthcare, education, or enterprise SaaS, this guide shows how FusionAuth helps teams deploy authentication their way securely, predictably, and at scale.

View Now

Top 3 Risks for DIY Auth in Regulated Industries

Building authentication in-house may seem appealing, but for regulated industries, it often introduces serious risk.

Organizations in banking, healthcare, and other highly regulated sectors face increasing pressure to secure sensitive data while meeting complex compliance requirements. DIY authentication systems can quickly become costly, difficult to scale, and hard to keep compliant as regulations evolve.

This white paper explores the top three risks of managing authentication internally, from security vulnerabilities and compliance gaps to operational strain on development teams, and explains why many organizations are turning to specialized authentication providers instead.

Inside, you’ll learn:

  • Why DIY authentication struggles to keep pace with evolving regulations
  • How security threats and downtime risks increase with in-house systems
  • What to look for when evaluating authentication vendors for regulated environments

Whether you’re reassessing an existing auth stack or planning for growth, this guide will help you understand the risks and make a more informed, future-ready decision.

Download the white paper to see why DIY authentication may be holding your organization back.

Get Whitepaper

The Developer’s Guide to Single Sign-On (SSO)

Single Sign-On sounds simple…until you're deep in SAML configs and OIDC flows.

This practical guide from Auth0 walks you through what actually works, where to start, and how to make the right architecture calls.

Download it to learn:

  • How SSO actually works (without the buzzwords)
  • Which protocols matter: SAML, OIDC, WS-Fed, LDAP
  • Where to start and how to integrate with Auth0
  • Whether to build, buy, or blend—and how not to regret the decision
View Now

OAuth 2.0 and OpenID Connect: The Professional Guide

In the world of digital identity, every detail matters. OAuth 2.0 and OpenID Connect are the foundational protocols for securing modern applications, but their complexity can be overwhelming. This professional guide goes beyond the surface, explaining not just the "how," but the "why" behind every implementation choice.

What You Will Learn:

  • The Evolution of Identity
  • Token Deep Dive
  • Practical Scenarios
  • Common Anti-Patterns
View Now

Auth0 and AWS: Building secure, scalable GenAI and SaaS apps

You've built a successful app and now you're ready to grow. But scaling for enterprise clients comes with a new set of challenges, including security, compliance, and user experience. Businesses want a solution that's secure, reliable, and easy to use, and many are turning to customer identity to build that trust.

Explore how the combined power of Auth0 and AWS helps you build enterprise-ready apps that:

  • Secure access at scale
  • Meet compliance requirements
  • Deliver frictionless user experiences
View Now

Customer Identity Trends Report 2025: Securing Customer Trust in The Age of AI

Uncover how trust influences customer journeys, the threats poised to erode it, and where consumers stand on a new frontier for trust — AI agents.

  • Find out what consumers really think about AI agents
  • Discover which industries are seeing the most identity-based attacks
  • Read about the latest customer identity threats faced worldwide
  • Gain insights into consumer attitudes around identity and authentication
View Now

MSP customer onboarding checklist

Onboarding new clients is a critical phase for managed service providers (MSPs). It sets the tone for the partnership and directly impacts your revenue timeline. Traditionally, this process can be time-consuming and prone to errors, but with a standardized approach, you can transform it into a swift, efficient, and profitable experience.

A new checklist from Nerdio provides a 10-step guide to standardize your customer onboarding process. It includes insights into how Nerdio Manager for MSP can automate each phase, helping to reduce onboarding time by up to 50%. The checklist covers key steps such as:

  • Pre-onboarding assessment: Understanding the client's current environment and setting clear expectations.
  • Tenant access & security setup: Establishing secure access and baseline security configurations.
  • Provision Azure infrastructure: Setting up the foundational Azure resources required for the client's operations.
  • Deploy policies: Ensuring all devices and users adhere to organizational policies.
  • Configure billing and reporting: Establishing transparent billing processes and maintaining comprehensive documentation.

This guide is designed to help you stop losing time and start gaining revenue by streamlining your process and eliminating manual effort.

Ready to get started?

View Now

CIS Level 1 Intune policies for Windows 11

The CIS (Center for Internet Security) Level 1 Baseline for Windows 11 is a robust security standard that helps to reduce the attack surface and standardize controls for enterprise and SMB fleets. Nerdio has partnered with CIS to deliver these CIS-hardened policies, developed directly by their security experts. When implemented through Microsoft Intune, these settings provide a consistent, auditable way to enforce best practices across thousands of endpoints.

To help you get started, Nerdio has created a full breakdown and guide to CIS Level 1 Intune policies for Windows 11 (3.0.1). This guide includes:

  • In-depth summaries of each policy, including purpose, highlights, and key settings
  • Practical deployment notes to guide you through implementation
  • Expected impact for end-users and help desks
  • A full reference table for quick look-up

This resource is designed to be your blueprint for a secure, supportable, and well-documented Windows security posture.

Ready to simplify your security?

View Now

Checklist: 9 ways MSPs can reduce costs

Are you feeling the squeeze of shrinking margins and growing customer expectations? It's a common challenge for managed service providers (MSPs). The key is to work smarter, not harder.

This new checklist from Nerdio is designed to help you do just that. It provides a practical self-assessment to help you identify where your business might be losing time, money, or opportunity across IT operations. This quick self-assessment covers high-impact categories based on MSP best practices and real-world data. Key areas include:

  • Licensing & software: Do you know how many licenses for commercial software you actually use versus how many you pay for?
  • Cloud optimization: Are you using auto-scaling to avoid overprovisioning during off-peak hours?
  • User onboarding: Can you onboard a new user in under 10 minutes with minimal manual steps?
  • Multi-tenant efficiency: Can you manage all clients from a single interface?
  • Talent & scalability: Are engineers focused on strategic work instead of repetitive tasks?

A high number of "No" or "Unsure" responses may reveal where automation or better tooling can unlock cost savings, improve consistency, and free your team to focus on high-value work.

Ready to find out where you can improve?

View Now

Does Your DEM Strategy Connect All the Dots?

Comprehensive DEM

Imagine a world where digital experiences are always on, performing flawlessly and able to handle any business situation. That world is in reach with a more comprehensive DEM that’s able to capture and integrate critical data from across your tech stack, identify where and why issues are happening, and help you fix them before they impact the relationships you’ve worked so hard to build with your users.

View Now

AI-Powered DEM: Bring Greater Intelligence to Every Digital Experience

Propel your business forward with AI-powered DEM

The most successful businesses are using AI-powered digital experience monitoring (DEM) capabilities to revolutionize how they manage their digital ecosystems. This leads to improved customer experiences from: Faster onboarding, efficient incident management, continuous optimization and everything in between.

View Now

AI Unwrapped 2025 Impact Report

Shipping code is only half the battle.

Without robust observability (the comprehensive logs, metrics, and traces that reveal precisely how systems are behaving in real-time), even the most brilliant applications become opaque, unreliable black boxes at scale. As artificial intelligence moves from speculative promise to foundational technology, we’re seeing the same critical lesson emerge.

View Now

How BytePlus ModelArk and ByteDance Seed Are Powering Creativity & Commerce

This e-book explores how BytePlus ModelArk and Seed models combine enterprise-grade infrastructure with advanced AI capabilities to accelerate content creation, empowering businesses to deliver high-quality text, images, and videos at scale for today’s fast-paced creative and commercial demands.

  • Content Suite in Days, Not Weeks
  • Studio-Quality Visuals & Video in Seconds
  • Enterprise-Grade AI Built for APAC & Global Scale
View Now