Digital Identity - Thematic Intelligence

Digital Identity - Thematic Intelligence

Summary

Digital identity is a collection of online information about a person, an organization, or a machine, which, when grouped together, can provide a digital representation of that entity. There are many possible use cases, but it took a global pandemic for governments to recognize that vaccination certificates on smartphones enabling foreign travel was the killer app that digital identity could deliver.

China is a clear leader in digital identity. It has the world’s most advanced social credit and surveillance systems and is planning a digital ID card to enable citizens to access services online. The Nordic countries and Estonia are well aware of the benefits of digital identities, as is India, with its Aadhaar ID system. The EU wants to give every citizen digital identity credentials accessible from digital wallets. Australia and New Zealand are edging towards legislation, and the UK and US are playing catch-up.

Financial services regulators’ adoption of anti-money laundering (AML) and know your customer (KYC) identity checks have catalyzed digital identity adoption. Public and private sector interoperability will be a measure of progress. Big Tech is staking its claim. Apple now supports mobile US driving licenses, and Microsoft has embraced decentralized digital IDs. Digital ID verification processes will cover users’ journeys through the metaverse.

Scope

  • This report provides an overview of the digital identity theme.
  • It identifies the key trends impacting growth of the theme over the next 12 to 24 months, classified into three categories: technology trends, macroeconomic trends, and regulatory trends.
  • The industry analysis section includes details of recent M&A activity and analysis of patents, company filings, and hiring data. It also provides a timeline setting out the key milestones in the development of the digital identity theme, along with digital identity use cases across industries.
  • The detailed value chain breaks down digital identity into four segments: digital ID creation, digital ID platforms, digital ID security, and digital ID services.
Reasons to Buy
  • Digital identity is one of the world’s most significant technology trends. Its embrace by governments, financial services organizations, and Big Tech means a revolution in how individuals interact with public and private organizations is underway. This report identifies companies that are well-positioned to benefit from the growth in digital identities over the next few years.


  • Executive Summary
  • Players
    • Table Figure 1: Who are the leading players in the digital identity theme, and where do they sit in the value chain?
  • Technology Briefing
    • What is a digital identity?
    • Different types of identity
      • Table Figure 2: Digital ID systems apply to both human and machine identities
      • Table Figure 3: Our thematic framework for digital identity
      • Table Figure 4: Digital identity: attributes and resources
    • The identity-security-privacy relationship
      • Table Figure 5: A tripartite relationship
    • The different models of digital identity
      • Centralized identity
        • Table Figure 6: Centralized identity is the oldest model of digital identity
      • Federated identity
        • Table Figure 7: A federated approach is the second oldest identity model
      • Self-sovereign identity
        • Table Figure 8: Self-sovereign is a new mVodel of digital identity
      • The use of blockchain in self-sovereign identity
  • Trends
    • Technology trends
      • Table Technology trends
    • Macroeconomic trends
      • Table Macroeconomic trends
    • Regulatory trends
      • Table Regulatory trends
  • Industry Analysis
    • Decentralized identities will help deliver an identity revolution
    • In the private sector, transaction monitoring is a key driver of digital identities
      • Table Figure 9: Digital ID systems use digital technology in various ways
      • Table Figure 10: A digital identity verification process for KYC
    • Financial services organizations are increasing digital identity initiatives
    • Digital identity will play a vital role in the metaverse
    • COVID-19 forced governments to develop their digital identity thinking
      • Table Figure 11: National developments in digital identity
    • The EU’s planned wallet will help drive access to online services using digital IDs
    • Big Tech will be a key driver of digital identity
    • Mergers and acquisitions
      • Table Mergers and acquisitions
    • Patent trends
      • Table Figure 12: Mentions of digital identity in patent publications have increased since 2017
      • Table Figure 13: Patent publications referencing self-sovereign identity are growing steadily
      • Table Figure 14: Increasing patent interest points to the growing adoption of digital identity
    • Company filings trends
      • Table Figure 15: Company filings are now increasingly referencing digital identity
    • Hiring trends
      • Table Figure 16: Hiring in digital identity is rising
    • Use cases
      • Table Figure 17: The number of use cases for digital identity is increasing
    • Timeline
      • Table Figure 18: The digital identity story
  • Value Chain
    • Table Figure 19: The digital identity value chain - Digital identity is a branch of cybersecurity software
    • Digital ID creation
      • Table Figure 20: The digital identity value chain - Digital ID creation: Digitalize ID
    • Digital ID platforms
      • Centralized, federated, and self-sovereign identity
        • Table Figure 21: The digital identity value chain - Digital ID platforms: centralized, federated, and self-sovereign platforms
    • Digital ID security
      • Identity management
        • Table Figure 22: The digital identity value chain - Digital ID security: identity management
      • Vulnerability management
      • Other monitoring
        • Table Figure 23: The digital identity value chain - Digital ID security: Vulnerability management
    • Digital ID services
      • Table Figure 24: The digital identity value chain
      • Managed security services
      • Managed identity services
      • Risk and compliance services
  • Companies
    • Public companies
      • Table Public companies
    • Private companies
      • Table Private companies
  • Sector Scorecards
    • Enterprise security software sector scorecard
      • Who’s who
        • Table Figure 25: Who does what in the enterprise security software space?
      • Thematic screen
        • Table Figure 26: Thematic screen - Enterprise security software sector scorecard
      • Valuation screen
        • Table Figure 27: Valuation screen - Enterprise security software sector scorecard
      • Risk screen
        • Table Figure 28: Risk screen - Enterprise security software sector scorecard
    • Social media sector scorecard
      • Who’s who
        • Table Figure 29: Who does what in the social media space?
      • Thematic screen
        • Table Figure 30: Thematic screen - Social media sector scorecard
      • Valuation screen
        • Table Figure 31: Valuation screen - Social media sector scorecard
      • Risk screen
        • Table Figure 32: Risk screen - Social media sector scorecard
  • Glossary
    • Table Glossary
  • Further Reading
    • GlobalData reports
      • Table GlobalData reports
  • Our thematic research methodology
    • Table Figure 33: Our five-step approach for generating a sector scorecard
  • About GlobalData
  • Contact Us

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook
Cookie Settings