Companies to Know

Innovators. Disruptors. Game-changers

OWI’s 2018 Identity Landscape was constructed with the intent to illustrate the full breadth of the Identity Industry. Here are some startups and established companies that are developing innovative identity solutions.

All companies listed in the landscape fall into one of three segments: Consumer Applications, Platforms & Enablers or Building Blocks. Within each segment, there are categories and in some instances, sub-categories. For more information on the segments, categories, and sub-categories, look at the definitions below.

To learn more about OWI’s Identity Landscape please read 2017: The year identity went mainstream

Click here to view OWI’s 2018 Identity Landscape

Consumer Applications
A consumer-user facing application that must directly interact with a businesses products to be considered for this category. This includes companies looking to empower consumers with their own data by providing platforms to control their information in a single, secure, personal library as well as companies that naturally build digital identities through consumer engagement.

Click here to learn more

Platforms & Enablers
Interoperable solutions or services that can offer similar experiences to multiple users on a variety of platforms or spaces. These companies are directly using building blocks to build and create platforms that will ultimately make consumer applications possible.

Click here to learn more

Building Blocks
Companies creating the foundational layer, the fundamental essentials, for digital identity platforms and applications to function. This includes the hardware, software, services, and standards utilized by platforms to create their products. A building block can come in the form of a physical component, code, thought leadership, or regulations and standards.

Click here to learn more


Digital Commerce: An online retailer, marketplace or platform facilitating the exchange of goods or services from either businesses to consumers or consumer to consumer.

  • Sharing Economy: These vendors create digital platform to facilitate the consumer to consumer exchange of goods and services with a strong focus on Trust and Safety.
  • E-commerce: Centralized administration and governance over a digital marketplace. These companies have their own distribution networks and sell their own products, and have a focus on fraud and marketplace.
  • Crowdfunding: Centrally administered platforms for the ability to receive and give capital investments into projects.

Authentication: Consumer-facing platforms, created by a central administrator / password manager, to manage and store multiple login credentials (think single sign-on). In addition to authentication, companies in this segment have identity proofing features.

  • Federated Identities: Centrally administered, consumer-facing platform that offers the ability to access multiple servers with one set of login credentials. These category includes companies who are certified to issue legal IDs in anticipation of eIDAS.
  • Password Managers: Applications to securely store and manage passwords.
  • Traditional IAM/Single Sign on: Independent third-party that helps consumers engage with application to gain access and permissions to specific products.

Social Networks: Consumer-facing social networks used by consumers to share share specific parts, attributes of their identity with their networks. 

  • Relationship/Dating: Platforms which use algorithms to pair people based on personal data attributes.
  • Social Media: Applications which allow the posting and consumption of statements, thoughts and opinions.
  • Video & Picture Sharing: Platforms designed for users to take, modify / edit, and post pictures and videos to their personal network.
  • Gaming: Companies who create online communities for video game players to interact, play together, purchase items, etc.
  • Communication: Companies which provide applications directly focused on the sending and receiving of messages from consumer to consumer.

Internet of Things: This category is focused on companies developing personal IoT which leverage personal consumer data to add efficiencies to everyday lives.

  • Wearables: Personal devices that are worn by users to monitor various health indicators; these devices also have the ability to alert users about monitored health indicators.
  • Smart Home: Connected devices in a person’s home or apartment that are also connected to the person’s cellular device, allowing the user to control various home devices (e.g., thermostat, light fixtures, appliances) from a single source.

Personal Identity: Companies who provide consumers with additional identity information and / or attributes to give consumers the ability to better identify, track, and manage their identity.

  • Genealogy: Services that analyze personal genomes to provide detailed familial history (including, but not limited to: ancestry, genealogy, DNA information).
  • Identity Protection: Product or service that assists consumers in directly protecting their identity (e.g., personal / financial information, select attributes, biometric information). These companies typically offer detection and alert services, mechanisms for recompense and even limited reimbursement should a consumer’s identity be compromised.
  • Self-Sovereign Identity: Services offering consumers the ability to create and manage an identity, free of any centralized authority being able to access and / or control the identity (or attributes of the identity).

Click here to see the companies in the Consumer Applications segment


Advisory Services:
For-profit advisory and consulting firms offering a vast range of services to companies focused in the identity space.

Consumer Data Aggregator/ Credit Bureau: Companies who capture, process, publish consumer data in a summary form, for purposes such as statistical analysis. This includes only traditional consumer data aggregators.

Master Data Management: Enterprise data management platforms which provide a variety of data services. These services include: IT architectural designs, analyzing large data sets, operating effectiveness, and/or how to capitalize on new or existing opportunities.

Document & Signature Verification: Product or service offering consumers the ability to securely sign documents with a digital signature and validate the authenticity of the received digital signature. Many products and services in this space conform to the EU standards / regulations on electronic identification and trust services for electronic transactions in the internal market (eIDAS).

  • Document Verification: Companies focused on providing verification of authenticity for government-issue documents.
  • eSignatures: Companies focused on providing mechanisms to create and store eSignatures; these companies are compliant with existing regulations.

Fintech: Companies are focused on utilizing new and scalable technologies to disrupt the financial services industry.

  • Open Banking: Companies focused on helping financial services customers securely share their financial data with other financial institutions by relying on networks instead of centralization.
  • Financial Inclusion & Alternative Credit: Financial solutions designed to provide financial services to emerging markets using alternative methods and solutions.
  • Financial Services & Payments: Companies focused on allowing both private individuals and businesses to accept and / or process payments over the internet.
  • Insurtech: Companies focused on transforming the insurance industry with new technology to improve customer experience, many times by leveraging customer data to improve their insurance coverage and make more accurate predictions about risk.

Identity & Access Management (IAM): Companies offering consumers the ability to access multiple, disparate platforms from a single point of authentication.

  • Identity as a Service (IDaaS): Third party providers of cloud based identity governance and administration.
  • Traditional IAM: Companies focused on ensuring that the proper people in an organization have the appropriate access to technology resources by regulating access to systems or networks based on the roles of individual users within the enterprise.
  • Customer Identity & Access Management (CIAM): In addition to IAM capabilities, these companies have the ability to capture and analyze real-time consumer information.
  • Authentication: Companies using a range of products focused on the authentication step of the identity lifecycle.
  • Physical Identity & Access Management: Companies focused on creating technologies to improve the effectiveness of access request and approval process as it pertains to identity.

Identity of Things: These companies assign and manage the identities of things in order to be managed and connected with other things, people, and / or companies over the internet. Companies in this space are also creating platforms and solutions to help expand IoT ecosystems.

  • Supply Chain Management: Companies which have developed IDoT ecosystems to increase the efficiencies of their supply chain processes.
  • Smart Cities: Companies focused on leveraging IoT devices to help improve the efficiency of resource management in urban areas.

Advertising & Marketing: Companies focused on using identity-related technologies to enhance the effectiveness, precision, and efficiency of advertising and marketing campaigns.

  • Adtech: Companies focused on using digital identities via technology and analytics to improve advertising campaigns.
  • Martech: Companies focused on identity resolution to increase the effectiveness of marketing efforts.

Regtech: This category is focused on companies creating new technologies to enable more secure processes in managing identity information and to ensure greater regulatory compliance in the identity space.

  • KYC/IDV: Companies focused on transforming high-cost and high-touch processes into customer friendly, fast, and accurate, automated regimes. These companies combine disparate data sources, both traditional and non-traditional, to verify customer identities with confidence.
  • Background Check: Companies focused on identifying, reviewing, and reporting on individual background information, both from private and public sources.
  • AML Compliance: Companies who have developed solutions with specific competencies in meeting AML regulations.
  • Healthcare: These companies have developed industry specific identity solutions to improve efficiencies of everyday process due to strict and specific regulations of the healthcare industry around the use / transfer of patient identity information (e.g., HIPAA).
  • Fraud Prevention & Risk Management: Companies who provide products and / or services in order to protect individuals and / or companies against risk, reputational damage, and fraudulent activities.

Self – Sovereign Identity: Services offering consumers the ability to create and manage an identity, and the attached identity attributes, without independent control of, or access to, the identity attributes by a centralized authority (government or otherwise).

Public Security / Travel: Companies focused on technologies and regional infrastructures to make travel easy for authorized travelers.

Click here to see the companies in the Platforms & Enablers segment


Hardware:
Segment focused on developing the fundamental hardware components for identity related products.

  • Processors/Chips: Companies focused on developing fundamental computer processing unit (CPU) hardware for identity-related products.
  • Parts/Kits: Manufacturers of low-powered single board computers and other fundamental computer parts.
  • Sensors: Companies focused on the development of fundamental sensors used in either IoT devices, biometrics, or other identity-related technologies.

Software: Fundamental level of coded instructions and protocols leveraged to build a variety of identity products and services.

Hardware/Software: Companies in this category have expressed proficiency in introducing both hardware and software products that are integral and fundamental to the identity industry.

Infrastructure: This segment includes the entities and institutions who are integral in establishing the framework for identity practices across industries.

  • Healthcare Providers: Companies who are authorized to develop, issue, and maintain health insurance and health provider networks. Additionally, these companies are the primary source of identity data within the healthcare industry.
  • Telecommunications: Companies who provide telecommunications products and services to consumers. These companies have access to and use consumer identity information to provide their products and services.
  • Standards Organizations: Organizations focused on establishing the laws, protocols, and guidelines for identity best practices and compliance standards across the identity industry.
  • National Identity Schemes: National government-created citizen identities which also serve as verification and authentication mechanisms for access to both public and private services.
  • Development Organizations: Organizations and companies focused on solving identity challenges in emerging markets.
  • Financial Institutions: These companies (who are limited to the financial industry) are capable of processing monetary transactions and play an integral role in the shaping of the global financial payments infrastructure. These companies develop robust KYC / AML compliant processes to meet regulatory requirements, and as such, are used as a benchmark for the wider identity industry.
  • Influencers: Companies focused on establishing and/or influencing identity related policies or best practices.

Funding: An established segment of firms who have made investments into a variety of companies within the identity landscape.

Click here to see the companies in the Building Blocks segment

Landscape Methodology

  1. Companies are categorized based on what was predominantly self-promoted as the “core” product / service OR on popular publicly-available professional data aggregators, e.g. Crunchbase and Linkedin. This principle makes it easy for an OWI analyst to justify their conclusion to external parties. Any deviation from this assumption based off of supplemental information must be clearly documented
  2. All companies must be placed in only one category
  3. Companies that are subsidiaries are widely excluded from the landscape although some exceptions were permitted to companies who have high brand awareness and an established position within an industry. (e.g., TrustedID, subsidiary of Experian is included in landscape)
  4. Companies in the landscape must have proven identity-related use cases for their product, thought leadership, or infrastructure
  5. Any and all opinions expressed in this exercise were based on opinions formed solely by One World Identity

Want to view 2017’s Identity Landscape? Click here

Have questions about the 2018 Identity Landscape? Please contact us at research@oneworldidentity.com

X