Identity service providers want to help media publishers, advertisers, advertising technology, and marketing technology companies connect and analyze their first-party data on a person- or household-basis for the purposes of planning, activating and measuring advertising and marketing campaigns. Identity & Transcoding for Advertising solutions on AWS enable identity service providers to deploy their services — and for their customers to integrate those services — into existing advertising and marketing workflows in a streamlined manner.
AWS Services
Purpose-built cloud products
![](https://d1.awsstatic.com/Gradient-Divider-orange-blue.317b0a6e1db69aa03ede8c5fd6fad7ee117a626f.jpg)
Total results: 3
- Alphabetical (A->Z)
Partner Solutions
Software, SaaS, or managed services from AWS Partners
![](https://d1.awsstatic.com/Gradient-Divider-orange-blue.317b0a6e1db69aa03ede8c5fd6fad7ee117a626f.jpg)
Total results: 3
- Publish Date
-
Neustar Always-On Consumer Identity Management (CIM)
Neustar’s Always On Identity Management gives you access to the most accurate and complete name, address, phone and email data available. The data is compiled, verified, and enhanced with hundreds of demographic, behavioral, financial, property, segmentation and geographic attributes and made available via a Realtime API. -
Unified ID 2.0 Operator
Unified ID 2.0 is an open-source identity solution built for the open internet. UID2 leverages encrypted email and phone number data to provide a privacy-conscious, secure, and accurate identity standard for the entire digital advertising ecosystem.
Guidance
Prescriptive architectural diagrams, sample code, and technical content
![](https://d1.awsstatic.com/Gradient-Divider-orange-blue.317b0a6e1db69aa03ede8c5fd6fad7ee117a626f.jpg)
Total results: 3
- Publish Date
-
Building Embedded Identity Services with Privacy-Safe…
This Guidance helps you to create an environment where AWS customers can consume an ISV Partner’s application within their own Amazon VPC, protecting the customer’s data while also protecting the Partner application’s implementation assets through isolated network access controls and subscription authorization.