Insights

Decentralized Identity

At its most basic, decentralized Identity is about giving the control of your data back to you with a digital identity. Usually your data (sometimes called attributes, identifiers, and credentials, for example your birth date) are stored in a centralized location If you make an account on a company website, the data is likely stored by the company. You don’t hold your information and therefore you have less control over it.

Guide
Guide
Decentralized Identity – a Playbook for Your Enterprise
Where is the blockchain? Looking beyond the blockchain hype with Decentralized Identity. Gain a differentiated understanding of the potential of Decentralized Identity for your organization.
Learn more
Tools Choice
Tools Choice
Providers of Verified Identity
Evaluate the perfect provider of verified identity for your enterprise. Examine the entire market segment and get in-depth analysis of products and services. Make a well-informed decision based on...
Learn more
Blog
Blog
Microsoft Putting Decentralized Identities Into Practice
Microsoft has announced their support for Verified Workplace in LinkedIn using Microsoft Entra Verified ID. While this focuses on a specific use case, it is an important step forward towards the...
Learn more
Leadership Brief
Leadership Brief
The Business Value of Decentralized Identity
Decentralized identity and self-sovereign identity (SSI) are some of the most promising solutions using blockchain technology. The value for individual users is clear, bringing them privacy and...
Learn more
Event Recording
Event Recording
The Future of Access Management: The Role of Contextual Intelligence, Verifiable Credentials, Decentralized Identity and Beyond
Learn more
Decentralized Identity - Why is it all the Rage?
Event Recording
Decentralized Identity - Why is it all the Rage?
From digital identity to full scale digital trust, this session is perfect for anyone new to identity, as well as identity professionals who are trying to get a handle on what decentralization is...
When SSI Meets IoT: Challenges and Opportunities
Event Recording
When SSI Meets IoT: Challenges and Opportunities
In this session, I will first talk about the design considerations and challenges when applying SSI to IoT, followed by the description of an initiative for creating an embedded SDK for SSI....
Centralized eID May be the Target of the Next Nordstream Pipeline Attack
Event Recording
Centralized eID May be the Target of the Next Nordstream Pipeline Attack
With the vast centralization of government digitization in general, and issuance and operation of Digital Identity services in particular, the Nordic countries have made themselves unnecessarily...
Digital Trust in the Metaverse & Decentralized Internet of Everything
Event Recording
Digital Trust in the Metaverse & Decentralized Internet of Everything
Phishing, hacking, threats, fraud, and malicious behavior online of all types all share a common root: verification. In this session we’ll go beyond identity and explain how decentralized...
Best Practice: Empowering the Vision of the IoT with Decentralized IAM
Event Recording
Best Practice: Empowering the Vision of the IoT with Decentralized IAM
How Self-Sovereign Identity (SSI) enables decentralized Identity and Access management for Things The Challenges of IoT and Identity  SSI key elements in a nutshell ...
The Decentralized Identity Journey has Begun in Financial Services
Event Recording
The Decentralized Identity Journey has Begun in Financial Services
Learn how Raiffeisen Bank International heads toward decentralized identity to empower their customers across Europe and set the gold standard for privacy protection. The...
Disruption Time? How to Approach and Embrace Decentralized Identity Inside the Enterprise
Event Recording
Disruption Time? How to Approach and Embrace Decentralized Identity Inside the Enterprise
Decentralized Identity is about to change the way we do IAM in enterprises. It is not just about the C-identities (consumers, customers, citizens). This raises two questions: What do to...
Leveraging Decentralized Identity Approaches in the Enterprise
Event Recording
Leveraging Decentralized Identity Approaches in the Enterprise
In this session, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts look at the potential of utilizing DID approaches within the enterprise. This session will look at the business...
Adam Cooper: Centralised or decentralised - what’s the real question?
Event Recording
Adam Cooper: Centralised or decentralised - what’s the real question?
There are clear battle lines drawn between the centralised and decentralised worlds, but how much of this is ideology and how much is simply a misunderstanding of how services are delivered,...
Make Decentralized Identity work in the real world with Decentralized Ecosystem Governance
Event Recording
Make Decentralized Identity work in the real world with Decentralized Ecosystem Governance
Decentralized identity has long been seen as a solution to the interconnected problems of verification, privacy, and security online, but now that it is being deployed in the marketplace, how does...
Adaptive Protection for Identities
Event Recording
Adaptive Protection for Identities
Decentralized Identity protection is important in data collaboration because it helps to protect the privacy and security of individuals and organizations involved in the supply chain. By ensuring...
Fallacy of Decentralisation
Event Recording
Fallacy of Decentralisation
Common Web3 narratives go like this: Web1 was decentralised. Web2 is centralised and dominated by GAFAM/BigTechs. Web3 will be decentralised. Is this real? Let us look back. Web1 was about...