
Time to evolve: the road to customer centricity
Having just attended some of the major identity conferences around the world, I have mixed feelings about how the market is moving. On one hand, there is great innovation and a lot of really cool stuf
Read more
Time to evolve: moving on from fortress mentality
Recently, at the 2023 European Cloud Conference (EIC) in Berlin I shared my biggest fears - nightmares even - of what can happen in Identity and Access Management (IAM).
Read more
What is Customer Identity and Access Management?
CIAM refers to the system/s that manage and secure customer identities, their access to an application or service and what they are able to do within it. CIAM solutions provide businesses with the too
Read more
The benefits of leveraging connected data to drive authorization
Check out the benefits that come when we swap out a static data model to a connected data model that leverages real-world, real-time context and relationships and use that data to drive authorization.
Read more
5 keys to maximising value from your CIAM solution
Want to see more value from your CIAM solution? Check out these five tips to shift your CIAM from a sunk cost to a value creation tool.
Read more
Knowledge for the Future of Access Control
This is the last of a blog series on the topic of authorization models. This final piece will provide an overview of IndyKite’s Knowledge-Based Access Control (KBAC) which is one of the key...
Read more
Time to take a stand on consumer privacy
Privacy is a myth - but it shouldn't be. The internet wasn’t created with an identity layer, which has led to personal information, credentials and data being strewn all over the web.
Read more
Comparison of access control and emerging models for the future
Building on from the many faces of Authorization, this article will compare how they work, when to use them and why we need to pay attention to emerging models.
Read more
The many faces of Authorization and why we need a new approach
Authorization and access control is an incredibly vast and complex area. In most organizations, this is an area that is fragmented and a topic that has been neglected for years. Part of that neglect i
Read more
Understanding the value inherent in your CIAM
Often, IAM is thought of as just the doorway or gateway to services but this is a severe under-utilization of a powerful business asset that can drive significant value for both business and the user.
Read more
5 Trends that will shape the way we do business in 2023
The world continues to evolve, as do we and the technology we use to support our daily business activities. As we kick off 2023, here are our picks of the five major trends that will drive change this
Read more
How to optimize access control
Access control is a critical enabler of most business systems. It governs and which trusted identities can access digital assets based on appropriate assurance levels...
Read more
Getting ahead in retail with Customer Identity
Retail has revolved around the customer, but not necessarily around customer identity. Here lies a massive opportunity for retailers that want to get ahead.
Read more
Can identity knowledge solve retail’s biggest issues?
It’s a big call - but hear us out. Retail faces some major challenges around technology and customer experience and we believe identity knowledge offers some significant benefits for each pain point.
Read more
Security is an important foundation - but don’t stop building there
When most people think of identity and access management, they think of securing and protecting the user, system and data. But there is more to the story.
Read more
Leveraging identity data to create business value
Every interaction you have with your customer is an opportunity to build trust, loyalty and create value - both for them and your business.
Read more
Building your identity knowledge graph
Following on from the latest webinar, which focused on how to build your identity knowledge graph, in this blog Brad Tumy walks us through an example scenario of how it can work in your organisation.
Read more
Enabling patient access to e-health data
As a major step forward in digitalization of the US health sector, patients are now entilted access to their electronic health records, following new rules. But how can healthcare organisations meet..
Read more
Identity knowledge - the key to ROI
If you have been following our journey at IndyKite you are familiar with our drive to look at the complexities surrounding the modern, digital landscape and find real-world solutions that the industry
Read more.jpg)
Implementing Knowledge-Based Access Control
Many of today’s identity and access management systems rely on directory information services, to store identity data.
Read more.jpg)
Delivering knowledge to solve customer challenges
Knowledge Based Access Control (KBAC)
We think a lot about the changing world around us. Not only because we want to solve the challenges, but we also want to find the opportunities.
Read more
Identity is about power
Identity Day 2022
Today is International Identity Day, an initiative focussed on raising awareness of the fundamental human right of a legal identity. September 16 represents UN Sustainable Development Goal 16.9
Read more
Identity and access management in a Web 3.0 context
At the heart of the Web 3.0 evolution is identity. How people use their identity to interact online with other people, services, devices and things is the critical piece for this next phase of the int
Read more
KuppingerCole Executive view
IndyKite Knowledge-Based Access Control (KBAC)
Given the growing ecosystem of digital identities that extend beyond humans to bots, devices, and machines in a modern world, there is also a corresponding need to manage the increasing complexity of
Read more
The benefits of Authorization-as-a-Service
Why knowledge matters
Dynamic authorization makes sense in principle, but what do we really mean when we talk about a solution requiring more flexible data models?
Read more
From Security to Utility
The new frontier of Identity and Access Management
Is security the only benefit of identity management - or is there another opportunity waiting to be discovered?
Read more
Decentralized identity for Web 3.0
The premise of decentralized identity management is giving ownership and control of identity data to individuals and devices in IOT. Likewise the premise of Web 3.0 is about moving away from...
Read more
Why knowledge is important for authorization
Authorization is a major part of an Identity and Access Management system (IAM) and is often a critical differentiator for medium to large enterprises.
Read more
The next generation of authorization
Authorization has experienced many approaches and models over the past few decades, with each new iteration striving to achieve less user friction while increasing security.
Read more
Knowledge forms the base of advanced authorization-as-a-service
As a veteran of the identity and access management industry, I have witnessed first-hand the evolution of authorization over the years. We have moved forward but the question still remains
Read more
Identity orchestration for Web 3.0
We are more online than ever before, and more of our lives are online than ever before. Our personal and identity data is collected by practically every service or product we engage with...
Read more
The value of graph for identity management
Graph technology is booming, with more and more industries jumping on the graph train. So what happens when you apply it to Identity and Access Management? Read on to see the value it can unlock.
Read more
The case for accountability
If you are on Twitter you surely know that the topic that has been trending in the last weeks has been…well, Twitter. Check out our thoughts on what authentication could mean for the twitterverse!
Read more
Why the future of identity will be decentralized
Do you know how many online accounts you have? How many services or websites know your credit card details, biometrics, ID numbers, addresses etc?
Read more
What is Identity and Access Management
Let's breakdown the what, why and who of IAM
Identity and Access Management (IAM) or Customer Identity and Access Management (CIAM) is the system that enables people to have access to and use of your systems.
Read more
The Evolving Role of Identity - So what's next?
We've come a long way in creating trust relationships online but possibly one of the biggest shifts to how digital identity is managed lays directly ahead.
Read more
The Magic is Knowing Relationships
As a futurist I study trends shaping the future of technology. For some years, I have followed the explosion of IoT devices with curiosity on how they will impact our businesses. ’m new to the graph..
Read more
Getting Started: Graph 101
Tech giants like Google, Facebook, LinkedIn and PayPal all tapped into the power of graph databases to create booming businesses. Their secret? They each used graph database technology to harness....
Read more
Human and NPE Identity
For many years, I’ve been active in a “human-centric digital identity” community. This community comes together twice a year at the Internet Identity Workshop and most of our conversation is around...
Read more
Managing Identity Relationships
Alex’s session provided real-life examples of identity relationships and their application by organizations implementing 360 views of their world-wide client base.
Read more
The NPE Identity Landscape
There is no single answer to the question: What is an NPE? Through our interviews and research, multiple definitions were used. This is due to different industries using the same terminology to....
Read more