Insights

Decentralized Identity

At its most basic, decentralized Identity is about giving the control of your data back to you with a digital identity. Usually your data (sometimes called attributes, identifiers, and credentials, for example your birth date) are stored in a centralized location If you make an account on a company website, the data is likely stored by the company. You don’t hold your information and therefore you have less control over it.

Guide
Guide
Decentralized Identity – a Playbook for Your Enterprise
Where is the blockchain? Looking beyond the blockchain hype with Decentralized Identity. Gain a differentiated understanding of the potential of Decentralized Identity for your organization.
Learn more
Tools Choice
Tools Choice
Providers of Verified Identity
Evaluate the perfect provider of verified identity for your enterprise. Examine the entire market segment and get in-depth analysis of products and services. Make a well-informed decision based on...
Learn more
Blog
Blog
Top 3 EIC Topics Picked by Martin Kuppinger
We sat down with KuppingerCole co-founder and principal analyst Martin Kuppinger to ask him about the top three topics that have gained importance since last year’s European Identity and Cloud...
Learn more
Leadership Compass
Leadership Compass
Reusable Verified Identity
This Leadership Compass provides an overview of up-to-date insights on the leaders in innovation, product features, and market reach for Reusable Verified Identity. These vendors enable a digital...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #37: COVID Response and Decentralized Identity Solutions/Verifiable Credentials
Anne Bailey and Matthias Reinwarth discuss how decentralized identities and verifiable credentials help respond to the pandemic by powering contact tracing applications, immunity passports and...
Learn more
Guide to Implementing Decentralized ID
Leadership Brief
Guide to Implementing Decentralized ID
Because the Identity Fabric describes a set of connected enabling IT components that work together as a single entity rather than a concrete tool, there are infinite possible implementations of an...
Predictions for 2022: Decentralized Technologies
Blog
Predictions for 2022: Decentralized Technologies
KuppingerCole Analysts pay close attention to all topics at the intersection of identity and security. Decentralized technologies often cross paths with these domains and, since it is a dynamic...
The Business Value of Decentralized Identity
Leadership Brief
The Business Value of Decentralized Identity
Decentralized identity and self-sovereign identity (SSI) are some of the most promising solutions using blockchain technology. The value for individual users is clear, bringing them privacy and...
Avast to Acquire Evernym: Consumer Cybersecurity Meets Decentralized Identity
Blog
Avast to Acquire Evernym: Consumer Cybersecurity Meets Decentralized Identity
Avast, a cybersecurity and privacy company, announced on December 9 th 2021 their intent to acquire Evernym. Founded in 1988 in Prague, Czech Republic, Avast focuses both on meeting both...
Verifiable Credentials: A Fresh Approach to Identity in the Digital Era
Webinar Recording
Verifiable Credentials: A Fresh Approach to Identity in the Digital Era
Establishing a verified digital identity is crucial to successful business collaboration and customer engagement in the digital economy. Verifiable Credentials provide a highly secure way of...
Business Use of Blockchain Technology
Blog
Business Use of Blockchain Technology
The rise of cryptocurrencies has in turn raised the profile of the blockchains, the underlying technology that many cryptocurrencies like Bitcoin operate on, which is rapidly becoming more...
The Decentralized E-Commerce Story | Frontier Talk #7 - Dr. Michele Nati
Frontier Talk
The Decentralized E-Commerce Story | Frontier Talk #7 - Dr. Michele Nati
In this episode, Raj Hegde sits with Dr. Michele Nati - Head of Telco and Infrastructure Development at #IOTA Foundation to understand how decentralization offers a fresh perspective towards...
Identity Security
Blog
Identity Security
Increased home and remote working and cloud migration are driving accelerated digital transformation, which has led to an explosion of digital identities, which are under attack more than ever...
A Primer for SSI in DE
Event Recording
A Primer for SSI in DE
Self-Sovereign Identity – or SSI in brief – is now a major thing. Germany has become one of the world’s key SSI accelerators. Countless people and organizations – small...
Bringing User-Centricity to Decentralized Identity | Frontier Talk #6 - Nat Sakimura
Frontier Talk
Bringing User-Centricity to Decentralized Identity | Frontier Talk #6 - Nat Sakimura
Raj Hegde sits with identity veteran, Nat Sakimura - Chairman of OpenID Foundation to understand how user-centric learnings from existing authentication protocols can be applied to future identity...
Enabling the Machine Economy and Decentralized Internet of Things | Frontier Talk #5 - Peter Busch
Frontier Talk
Enabling the Machine Economy and Decentralized Internet of Things | Frontier Talk #5 - Peter Busch
Raj Hegde sits down with Peter Busch, DLT Product Owner at Bosch , to discuss how decentralization is enabling a wide range of exciting use cases across industries. Tune in to this episode to...
EIC Speaker Spotlight: Doc Searls on Decentralized Identity
Blog
EIC Speaker Spotlight: Doc Searls on Decentralized Identity
Doc Searls, Co-founder and board member of Customer Commons, and Director of ProjectVRM, is to deliver a keynote entitled Where Stands the Sovereign Self? at the European Identity and Cloud...