Purchase your subscription online now and get access to the whole body of KC Plus research including Leadership Compasses.
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Expertise & market knowledge in all relevant decision-making processes
Learn more how we can support you in the definition of future IT strategies
Sell-side and business-side advisory, research syndication and events
Take advantage of our Networking and Advisory Opportunities to be one step ahead
Register for our live Webinars - it's free
Watch previous webinar recordings & session videos from our live events
Cybersecurity Trends and Challenges 2020Jan 30, 20203:00pm CET, 9:00am EST
Register now for free
Learn more about our Sponsorship Opportunities
Keep up to date with all major news about our company, events and projects
Learn more about our newsletters
Subscribe for free
Improve Security With Critical Infrastructures Requirements
Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Digital identity solutions are very wide spread and everybody is using them on a day to day basis. Mainly it can be distinguished between state issued IDs/eIDs which lack usability and are therefore not as successful as hoped and self-claimed or self-established eIDs (sometimes stored in the blockchain) where service providers have to rely on the honesty of the user. Additionally, self-claimed solutions mostly focus on the eID and don’t cover traditional ID documents. In this presentation, a mobile ID solution is presented that shows a combination of traditional printed ID documents and electronic identities (eID) into a multi-platform smartphone app that is recognized by the government. It’s an ID/eID scheme for transparent identification and authentication in the physical and digital world while security, privacy, data protection, usability and user trust are at equilibrium. Security is built upon secure processes rather than hardware (like secure elements), thus providing the fundament for broad adoption including technically challenged people. Scalable architecture, standard future-proven technologies like OpenID Connect, FIDO authentication and eIDAS compatibility build the framework for secure, failsafe and large deployments.
Language: English • Duration: 19:31 • Resolution: 1280x720
Executive View: Onegini Connect - 80168
Leadership Brief: Six Key Actions to Prepare for CCPA - 80353
Leadership Brief: Top Ten Trends in Cybersecurity - 80336
Whitepaper: Healthcare IAM: Enhance the Clinical Workflow - 80163
Executive View: Informatica: Customer 360 - 80290
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
Artificial Intelligence and Machine Learning