Insights

Decentralized Identity

At its most basic, decentralized Identity is about giving the control of your data back to you with a digital identity. Usually your data (sometimes called attributes, identifiers, and credentials, for example your birth date) are stored in a centralized location If you make an account on a company website, the data is likely stored by the company. You don’t hold your information and therefore you have less control over it.

Guide
Guide
Decentralized Identity – a Playbook for Your Enterprise
Where is the blockchain? Looking beyond the blockchain hype with Decentralized Identity. Gain a differentiated understanding of the potential of Decentralized Identity for your organization.
Learn more
Tools Choice
Tools Choice
Providers of Verified Identity
Evaluate the perfect provider of verified identity for your enterprise. Examine the entire market segment and get in-depth analysis of products and services. Make a well-informed decision based on...
Learn more
Blog
Blog
Gear Up for the Future with Decentralized Identity
In the digital era, business would greatly benefit from having increased identity assurance levels, be able to interact securely with partners, suppliers, consumers, and customers, and be able to...
Learn more
Leadership Brief
Leadership Brief
The Business Value of Decentralized Identity
Decentralized identity and self-sovereign identity (SSI) are some of the most promising solutions using blockchain technology. The value for individual users is clear, bringing them privacy and...
Learn more
Event Recording
Event Recording
Interview with Dr. Andre Kudra
Learn more
Gear Up for the Future with Decentralized Identity
Blog
Gear Up for the Future with Decentralized Identity
In the digital era, business would greatly benefit from having increased identity assurance levels, be able to interact securely with partners, suppliers, consumers, and customers, and be able to...
Enabling Digital Engagement With GAIN
Blog
Enabling Digital Engagement With GAIN
Digital engagement is a key driver of economic growth, but the lack of reusable, verified identities is a significant problem that needs to be solved. At present, there is no way for anyone to...
Women in Identity
Blog
Women in Identity
We all know that women are facing the challenge of diversity in the IT industry. But what exactly is a digital twin? And how can we build a Self-sovereign Identity? Woman in Identity (WID) has...
Decentralizing Identity for the Digital Era
Blog
Decentralizing Identity for the Digital Era
Every day the world is becoming more digital, which means we increasingly need an effective, trusted, and convenient way to prove our identity as we interact with digital services from...
Empowering Individuals with Self-Sovereign Identity
Blog
Empowering Individuals with Self-Sovereign Identity
Find out, how SSI disrupts the traditional identity and access management market and why customers benefit from it. Watch now!
Decentralization Is Like the Analog World
Blog
Decentralization Is Like the Analog World
The magic happens when you realize that an identity is just a data point, and the data subject associated with it can be anything. The possibilities of this technology are endless, but how can...
Implementing Decentralized Identity
Blog
Implementing Decentralized Identity
The world is becoming digital, which means we increasingly need an effective, trusted, and convenient way to prove our identity as we interact with digital services from governments, retailers,...
Predictions for 2022: Decentralized Technologies
Blog
Predictions for 2022: Decentralized Technologies
KuppingerCole Analysts pay close attention to all topics at the intersection of identity and security. Decentralized technologies often cross paths with these domains and, since it is a dynamic...
Avast to Acquire Evernym: Consumer Cybersecurity Meets Decentralized Identity
Blog
Avast to Acquire Evernym: Consumer Cybersecurity Meets Decentralized Identity
Avast, a cybersecurity and privacy company, announced on December 9 th 2021 their intent to acquire Evernym. Founded in 1988 in Prague, Czech Republic, Avast focuses both on meeting both...
Business Use of Blockchain Technology
Blog
Business Use of Blockchain Technology
The rise of cryptocurrencies has in turn raised the profile of the blockchains, the underlying technology that many cryptocurrencies like Bitcoin operate on, which is rapidly becoming more...
1 2 Next