Risk and fraud reduction require a better understanding of who your customers are. Many organizations have stringent regulations, e.g. Banks and Know Your Customer (KYC). Customers, employees and citizens have extensive digital profiles, accounts and passwords resulting in a poor user experience and security vulnerabilities. Integrate onboarding and verification services at the highest level of trust as established by eIDAS (EU 2015) and ISO/IEC 29115 standards.
Including two different categories of authentication factors and protection against duplication and tampering by attackers with high attack potential (e.g., embed cryptographic key material in tamper-resistant hardware token + PIN, biometrics with liveness detection + PIN/smart card).
The premise of decentralized identity management is giving ownership and control of identity data to individuals and devices in IOT. Likewise the premise of Web 3.0 is about moving away from...
We are more online than ever before, and more of our lives are online than ever before. Our personal and identity data is collected by practically every service or product we engage with...
David Mahdi talks us through the challenging landscape to unpack the opportunities in privacy and consent, with Sutton Maxwell bringing IndyKite's perspective.
Open Source is the driving force for innovation. Together we can solve emerging data and identity concerns for both humans and the exploding world of things and non-person entities.
IndyKite sees the opportunity to build the next generation of digital identity. Our developer-friendly identity framework, based on the relationship graph, supports existing authorization and authentication for humans and non-human identities, while turning the relationships between data into meaningful and actionable insights.