Blogs

Check out the latest blogs and webinars from our very own identity geeks.
Lasse Andresen
May 25, 2023

Time to evolve: moving on from fortress mentality

Recently, at the 2023 European Cloud Conference (EIC) in Berlin I shared my biggest fears - nightmares even - of what can happen in Identity and Access Management (IAM).
Read more
Patricia Alfheim
April 19, 2023

What is Customer Identity and Access Management?

CIAM refers to the system/s that manage and secure customer identities, their access to an application or service and what they are able to do within it. CIAM solutions provide businesses with the too
Read more
Patricia Alfheim
April 4, 2023

The benefits of leveraging connected data to drive authorization

Check out the benefits that come when we swap out a static data model to a connected data model that leverages real-world, real-time context and relationships and use that data to drive authorization.
Read more
Patricia Alfheim
March 27, 2023

5 keys to maximising value from your CIAM solution

Want to see more value from your CIAM solution? Check out these five tips to shift your CIAM from a sunk cost to a value creation tool.
Read more
Måns Håkansson
March 7, 2023

Knowledge for the Future of Access Control

This is the last of a blog series on the topic of authorization models. This final piece will provide an overview of IndyKite’s Knowledge-Based Access Control (KBAC) which is one of the key...
Read more
Lasse Andresen
February 23, 2023

Time to take a stand on consumer privacy

Privacy is a myth - but it shouldn't be. The internet wasn’t created with an identity layer, which has led to personal information, credentials and data being strewn all over the web.
Read more
Måns Håkansson
February 20, 2023

Comparison of access control and emerging models for the future

Building on from the many faces of Authorization, this article will compare how they work, when to use them and why we need to pay attention to emerging models.
Read more
Måns Håkansson
February 9, 2023

The many faces of Authorization and why we need a new approach

Authorization and access control is an incredibly vast and complex area. In most organizations, this is an area that is fragmented and a topic that has been neglected for years. Part of that neglect i
Read more
Patricia Alfheim
January 30, 2023

Understanding the value inherent in your CIAM

Often, IAM is thought of as just the doorway or gateway to services but this is a severe under-utilization of a powerful business asset that can drive significant value for both business and the user.
Read more
Patricia Alfheim
January 17, 2023

5 Trends that will shape the way we do business in 2023

The world continues to evolve, as do we and the technology we use to support our daily business activities. As we kick off 2023, here are our picks of the five major trends that will drive change this
Read more
Patricia Alfheim
January 9, 2023

How to optimize access control

Access control is a critical enabler of most business systems. It governs and which trusted identities can access digital assets based on appropriate assurance levels...
Read more
Patricia Alfheim
December 13, 2022

Getting ahead in retail with Customer Identity

Retail has revolved around the customer, but not necessarily around customer identity. Here lies a massive opportunity for retailers that want to get ahead.
Read more
Patricia Alfheim
December 6, 2022

Can identity knowledge solve retail’s biggest issues?

It’s a big call - but hear us out. Retail faces some major challenges around technology and customer experience and we believe identity knowledge offers some significant benefits for each pain point.
Read more
Patricia Alfheim
November 11, 2022

Security is an important foundation - but don’t stop building there

When most people think of identity and access management, they think of securing and protecting the user, system and data. But there is more to the story.
Read more
Patricia Alfheim
November 1, 2022

Leveraging identity data to create business value

Every interaction you have with your customer is an opportunity to build trust, loyalty and create value - both for them and your business. 
Read more
Brad Tumy
October 21, 2022

Building your identity knowledge graph

Following on from the latest webinar, which focused on how to build your identity knowledge graph, in this blog Brad Tumy walks us through an example scenario of how it can work in your organisation.
Read more
Patricia Alfheim
October 17, 2022

Enabling patient access to e-health data

As a major step forward in digitalization of the US health sector, patients are now entilted access to their electronic health records, following new rules. But how can healthcare organisations meet..
Read more
Alexandra Teachout
October 6, 2022

Identity knowledge - the key to ROI

If you have been following our journey at IndyKite you are familiar with our drive to look at the complexities surrounding the modern, digital landscape and find real-world solutions that the industry
Read more
Brad Tumy
September 27, 2022

Implementing Knowledge-Based Access Control

Many of today’s identity and access management systems rely on directory information services, to store identity data.
Read more
Alexandra Teachout
September 21, 2022

Delivering knowledge to solve customer challenges

Knowledge Based Access Control (KBAC)

We think a lot about the changing world around us. Not only because we want to solve the challenges, but we also want to find the opportunities.
Read more
Patricia Alfheim
September 16, 2022

Identity is about power

Identity Day 2022

Today is International Identity Day, an initiative focussed on raising awareness of the fundamental human right of a legal identity. September 16 represents UN Sustainable Development Goal 16.9
Read more
Patricia Alfheim
September 14, 2022

Identity and access management in a Web 3.0 context 

At the heart of the Web 3.0 evolution is identity. How people use their identity to interact online with other people, services, devices and things is the critical piece for this next phase of the int
Read more
Richard Hill
September 14, 2022

KuppingerCole Executive view

IndyKite Knowledge-Based Access Control (KBAC)

Given the growing ecosystem of digital identities that extend beyond humans to bots, devices, and machines in a modern world, there is also a corresponding need to manage the increasing complexity of
Read more
Alexandra Teachout
September 9, 2022

‍The benefits of Authorization-as-a-Service

Why knowledge matters 

Dynamic authorization makes sense in principle, but what do we really mean when we talk about a solution requiring more flexible data models?
Read more
Patricia Alfheim
August 29, 2022

From Security to Utility

The new frontier of Identity and Access Management 

Is security the only benefit of identity management - or is there another opportunity waiting to be discovered?
Read more
Patricia Alfheim
August 25, 2022

Decentralized identity for Web 3.0

The premise of decentralized identity management is giving ownership and control of identity data to individuals and devices in IOT. Likewise the premise of Web 3.0 is about moving away from...
Read more
Patricia Alfheim
August 12, 2022

Why knowledge is important for authorization

Authorization is a major part of an Identity and Access Management system (IAM) and is often a critical differentiator for medium to large enterprises. 
Read more
Patricia Alfheim
July 20, 2022

The next generation of authorization

Authorization has experienced many approaches and models over the past few decades, with each new iteration striving to achieve less user friction while increasing security.
Read more
Lasse Andresen
July 11, 2022

Knowledge forms the base of advanced authorization-as-a-service

As a veteran of the identity and access management industry, I have witnessed first-hand the evolution of authorization over the years. We have moved forward but the question still remains
Read more
Patricia Alfheim
June 29, 2022

Identity orchestration for Web 3.0

We are more online than ever before, and more of our lives are online than ever before. Our personal and identity data is collected by practically every service or product we engage with...
Read more
Patricia Alfheim
May 25, 2022

The value of graph for identity management

Graph technology is booming, with more and more industries jumping on the graph train. So what happens when you apply it to Identity and Access Management? Read on to see the value it can unlock.
Read more
Alexandra Teachout
May 16, 2022

The case for accountability

If you are on Twitter you surely know that the topic that has been trending in the last weeks has been…well, Twitter. Check out our thoughts on what authentication could mean for the twitterverse!
Read more
Patricia Alfheim
April 12, 2022

Why the future of identity will be decentralized

Do you know how many online accounts you have? How many services or websites know your credit card details, biometrics, ID numbers, addresses etc?
Read more
March 23, 2022

What is Identity and Access Management

Let's breakdown the what, why and who of IAM

Identity and Access Management (IAM) or Customer Identity and Access Management (CIAM) is the system that enables people to have access to and use of your systems.
Read more
Patricia Alfheim
March 21, 2022

The Evolving Role of Identity - So what's next?

We've come a long way in creating trust relationships online but possibly one of the biggest shifts to how digital identity is managed lays directly ahead.
Read more
Marius Sorteberg
January 13, 2022

The Magic is Knowing Relationships

As a futurist I study trends shaping the future of technology. For some years, I have followed the explosion of IoT devices with curiosity on how they will impact our businesses. ’m new to the graph..
Read more
Line Austnes
December 13, 2021

Getting Started: Graph 101

Tech giants like Google, Facebook, LinkedIn and PayPal all tapped into the power of graph databases to create booming businesses. Their secret? They each used graph database technology to harness....
Read more
Heather Vescent
November 13, 2021

Human and NPE Identity

For many years, I’ve been active in a “human-centric digital identity” community. This community comes together twice a year at the Internet Identity Workshop and most of our conversation is around...
Read more
Derek Small
May 13, 2021

Managing Identity Relationships

Alex’s session provided real-life examples of identity relationships and their application by organizations implementing 360 views of their world-wide client base.
Read more
Heather Vescent
April 13, 2021

The NPE Identity Landscape

There is no single answer to the question: What is an NPE? Through our interviews and research, multiple definitions were used. This is due to different industries using the same terminology to....
Read more