7 Comments
User's avatar
Rdxjgfz's avatar

Great article! Nothing about DID/VC from W3C and ZKP?

Expand full comment
Tushar Mothe's avatar

Exceptional insights! This article reflects deep expertise and offers valuable clarity on such a critical topic.

Expand full comment
YLO's avatar

Incredible analysis, thanks to had put this down in a very explicit language !

Bravoo !

Expand full comment
Bart-Vee's avatar

Great article! Thanks for sharing!

Make sure to check out www.raito.io

We help save data teams 75% of their time on access management workflows by providing CIEM and SIEM functionality for data.

Expand full comment
Brad Goettemoeller's avatar

I love the graphic you created but it seems like you left Okta/Auth0 out of the Customer Identity segment. Since they are the leader there, it's a major miss. Can you update the graphic to include them?

Expand full comment
Darwin Salazar's avatar

Wow. Very comprehensive analysis. Thanks for putting this together, Francis!!

Expand full comment
Apurva Dave's avatar

Hi @francis thanks for this article, well written. I think you have a slight error in this sentence, "Aembit is a very early identity company that does authentication for workload identity companies."

The use of companies at the end doesn't quite make sense. I think you meant something like, "...does access management for workload identities."

Expand full comment