Insights

Decentralized Identity

At its most basic, decentralized Identity is about giving the control of your data back to you with a digital identity. Usually your data (sometimes called attributes, identifiers, and credentials, for example your birth date) are stored in a centralized location If you make an account on a company website, the data is likely stored by the company. You don’t hold your information and therefore you have less control over it.

Guide
Guide
Decentralized Identity – a Playbook for Your Enterprise
Where is the blockchain? Looking beyond the blockchain hype with Decentralized Identity. Gain a differentiated understanding of the potential of Decentralized Identity for your organization.
Learn more
Tools Choice
Tools Choice
Providers of Verified Identity
Evaluate the perfect provider of verified identity for your enterprise. Examine the entire market segment and get in-depth analysis of products and services. Make a well-informed decision based on...
Learn more
Blog
Blog
The Path of Unifying Identities
One Identity Field Strategist Robert Byrne explains why he thinks that the identity community needs to better educate business and even IT managers who shortsightedly equate identity with their...
Learn more
Leadership Brief
Leadership Brief
Guide to Implementing Decentralized ID
Because the Identity Fabric describes a set of connected enabling IT components that work together as a single entity rather than a concrete tool, there are infinite possible implementations of an...
Learn more
Event Recording
Event Recording
Fallacy of Decentralisation
Common Web3 narratives go like this: Web1 was decentralised. Web2 is centralised and dominated by GAFAM/BigTechs. Web3 will be decentralised. Is this real? Let us look back. Web1 was about...
Learn more
Enabling Digital Engagement With GAIN
Blog
Enabling Digital Engagement With GAIN
Digital engagement is a key driver of economic growth, but the lack of reusable, verified identities is a significant problem that needs to be solved. At present, there is no way for anyone to...
Women in Identity
Blog
Women in Identity
We all know that women are facing the challenge of diversity in the IT industry. But what exactly is a digital twin? And how can we build a Self-sovereign Identity? Woman in Identity (WID) has...
Decentralizing Identity for the Digital Era
Blog
Decentralizing Identity for the Digital Era
Every day the world is becoming more digital, which means we increasingly need an effective, trusted, and convenient way to prove our identity as we interact with digital services from...
Empowering Individuals with Self-Sovereign Identity
Blog
Empowering Individuals with Self-Sovereign Identity
Find out, how SSI disrupts the traditional identity and access management market and why customers benefit from it. Watch now!
Decentralization Is Like the Analog World
Blog
Decentralization Is Like the Analog World
The magic happens when you realize that an identity is just a data point, and the data subject associated with it can be anything. The possibilities of this technology are endless, but how can...
Implementing Decentralized Identity
Blog
Implementing Decentralized Identity
The world is becoming digital, which means we increasingly need an effective, trusted, and convenient way to prove our identity as we interact with digital services from governments, retailers,...
Predictions for 2022: Decentralized Technologies
Blog
Predictions for 2022: Decentralized Technologies
KuppingerCole Analysts pay close attention to all topics at the intersection of identity and security. Decentralized technologies often cross paths with these domains and, since it is a dynamic...
Avast to Acquire Evernym: Consumer Cybersecurity Meets Decentralized Identity
Blog
Avast to Acquire Evernym: Consumer Cybersecurity Meets Decentralized Identity
Avast, a cybersecurity and privacy company, announced on December 9 th 2021 their intent to acquire Evernym. Founded in 1988 in Prague, Czech Republic, Avast focuses both on meeting both...
Business Use of Blockchain Technology
Blog
Business Use of Blockchain Technology
The rise of cryptocurrencies has in turn raised the profile of the blockchains, the underlying technology that many cryptocurrencies like Bitcoin operate on, which is rapidly becoming more...
Identity Security
Blog
Identity Security
Increased home and remote working and cloud migration are driving accelerated digital transformation, which has led to an explosion of digital identities, which are under attack more than ever...
EIC Speaker Spotlight: Doc Searls on Decentralized Identity
Blog
EIC Speaker Spotlight: Doc Searls on Decentralized Identity
Doc Searls, Co-founder and board member of Customer Commons, and Director of ProjectVRM, is to deliver a keynote entitled Where Stands the Sovereign Self? at the European Identity and Cloud...
EIC Speaker Spotlight: Michele Nati on Decentralized Identity
Blog
EIC Speaker Spotlight: Michele Nati on Decentralized Identity
Michele Nati, Head of Telco and Infrastructure Development at the IOTA Foundation, will participate in panels on Decentralized Identity and Self-Sovereign Identity at the European Identity and...