Insights

Decentralized Identity

At its most basic, decentralized Identity is about giving the control of your data back to you with a digital identity. Usually your data (sometimes called attributes, identifiers, and credentials, for example your birth date) are stored in a centralized location If you make an account on a company website, the data is likely stored by the company. You don’t hold your information and therefore you have less control over it.

Guide
Guide
Decentralized Identity – a Playbook for Your Enterprise
Where is the blockchain? Looking beyond the blockchain hype with Decentralized Identity. Gain a differentiated understanding of the potential of Decentralized Identity for your organization.
Learn more
Tools Choice
Tools Choice
Providers of Verified Identity
Evaluate the perfect provider of verified identity for your enterprise. Examine the entire market segment and get in-depth analysis of products and services. Make a well-informed decision based on...
Learn more
Blog
Blog
Business Use of Blockchain Technology
The rise of cryptocurrencies has in turn raised the profile of the blockchains, the underlying technology that many cryptocurrencies like Bitcoin operate on, which is rapidly becoming more...
Learn more
Leadership Compass
Leadership Compass
Providers of Verified Identity 2022
This Leadership Compass provides an overview up-to-date insights on the leaders in innovation, product features, and market reach for full-services Providers of Verified Identity. These vendors...
Learn more
Event Recording
Event Recording
CIAM, Wallets, Decentralized - Where is "Traditional" CIAM Heading?
Learn more
Decentralized Identity - Why is it all the Rage?
Event Recording
Decentralized Identity - Why is it all the Rage?
From digital identity to full scale digital trust, this session is perfect for anyone new to identity, as well as identity professionals who are trying to get a handle on what decentralization is...
Adam Cooper: Centralised or decentralised - what’s the real question?
Event Recording
Adam Cooper: Centralised or decentralised - what’s the real question?
There are clear battle lines drawn between the centralised and decentralised worlds, but how much of this is ideology and how much is simply a misunderstanding of how services are delivered,...
Leveraging Decentralized Identity Approaches in the Enterprise
Event Recording
Leveraging Decentralized Identity Approaches in the Enterprise
In this session, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts look at the potential of utilizing DID approaches within the enterprise. This session will look at the business...
Disruption Time? How to Approach and Embrace Decentralized Identity Inside the Enterprise
Event Recording
Disruption Time? How to Approach and Embrace Decentralized Identity Inside the Enterprise
Decentralized Identity is about to change the way we do IAM in enterprises. It is not just about the C-identities (consumers, customers, citizens). This raises two questions: What do to...
The Decentralized Identity Journey has Begun in Financial Services
Event Recording
The Decentralized Identity Journey has Begun in Financial Services
Learn how Raiffeisen Bank International heads toward decentralized identity to empower their customers across Europe and set the gold standard for privacy protection. The...
Best Practice: Empowering the Vision of the IoT with Decentralized IAM
Event Recording
Best Practice: Empowering the Vision of the IoT with Decentralized IAM
How Self-Sovereign Identity (SSI) enables decentralized Identity and Access management for Things The Challenges of IoT and Identity  SSI key elements in a nutshell ...
Make Decentralized Identity work in the real world with Decentralized Ecosystem Governance
Event Recording
Make Decentralized Identity work in the real world with Decentralized Ecosystem Governance
Decentralized identity has long been seen as a solution to the interconnected problems of verification, privacy, and security online, but now that it is being deployed in the marketplace, how does...
Digital Trust in the Metaverse & Decentralized Internet of Everything
Event Recording
Digital Trust in the Metaverse & Decentralized Internet of Everything
Phishing, hacking, threats, fraud, and malicious behavior online of all types all share a common root: verification. In this session we’ll go beyond identity and explain how decentralized...
Centralized eID May be the Target of the Next Nordstream Pipeline Attack
Event Recording
Centralized eID May be the Target of the Next Nordstream Pipeline Attack
With the vast centralization of government digitization in general, and issuance and operation of Digital Identity services in particular, the Nordic countries have made themselves unnecessarily...
When SSI Meets IoT: Challenges and Opportunities
Event Recording
When SSI Meets IoT: Challenges and Opportunities
In this session, I will first talk about the design considerations and challenges when applying SSI to IoT, followed by the description of an initiative for creating an embedded SDK for SSI....
Solving a Logistical Nightmare: Imagining a Decentralized Identity Future at DB Schenker
Event Recording
Solving a Logistical Nightmare: Imagining a Decentralized Identity Future at DB Schenker
IAM is hard enough without the additional complexities that logistics companies face. Warehouses need to be secure, but it’s difficult to find an identity solution that’s suitable for...
Enforcing Decentralized Authorization in a Multi-Platform API Landscape at Scale
Event Recording
Enforcing Decentralized Authorization in a Multi-Platform API Landscape at Scale
Authorization (AuthZ) and Authentication (AuthN) go hand in hand in ensuring zero-trust in your system landscape. But while scaling identity can be done by centralizing it in an IAM solution,...