News

Just add trust...to transact

Created with Sketch.

The case for an open loop identity system

Lessons for identity from real-time payments and mobile wallets Ask anyone in the digital identity world, and invariably they will say that identifying someone to do a transaction is complicated. Anyone who thinks you can present a mobile wallet and bingo, you are verified to transact, is the equivalent of saying a swan glides but…
Read more

Avoco advises on the Scottish Government’s digital identity programme

Avoco Secure began work on the initial one-year project in February 2022 with an option for further extensions. A key commitment within Scotland’s Digital Strategy is the introduction of a digital identity service. The digital identity service will establish a trusted and secure service for people to prove who they are and/or that they are…
Read more

Kuppinger Cole Awards Avoco “Outstanding in Identity Attribute Collection”

Avoco Secure are proud to be described as “Outstanding in Identity Attribute Collection” in the latest KuppingerCole Market Compass for “Providers of Verified Identity”. KuppingerCole described our technology as: “Avoco provides an identity hub which is situated between the data sources and a relying party and uses an identity API to call identity data for…
Read more

GCloud 13 and Avoco

Avoco on GCloud12 for UK Gov procurement

Open Banking – The answer to reducing fraud and streamlining access to government services

Government services have been on a roller coaster ride for years now as technologies come and go. This situation is not unique to the UK. Government bodies across the world are actively trying to tackle the issues of customer engagement using identity tools. In the UK, even with the efforts of Verify, we still have…
Read more

What the use of open banking means for identity networks

By connecting identity data from multiple sources through APIs, the open banking concept can help verify identity more reliably and improve the customer experience. When you think of Payment Services Directive 2 (PSD2), what likely springs to mind is the implementation of the Secure Customer Authentication rule (SCA). SCA was brought in as an additional…
Read more

Feeling secure enough to use open source for IAM projects

Identity is big, really big, especially when it is customer facing. There are a lot of moving parts to build, pieces to hook up, and external functionality to integrate. The whole makes the identity ecosystem which was once a dream of a few but is fast becoming a reality for many. Part of this movement…
Read more

Oh No, Not Another Article About Passwords: Will WebAuthn Replace Passwords or Not?

The humble, much-maligned password has been in the news again lately. The FIDO Alliance and W3C announced in April the release of the password killer web API named WebAuthn. But, are we singing the “Bye, bye password” song, only to start up a chorus of “You say goodbye and I say hello”? Let’s take a…
Read more

The Cloud’s the Limit for Secure, Complaint, Identity Storage, and Personal Data

Back in 2009, I gave a talk about Cloud identity. It went down, less like a fluffy Cloud and more like a lead balloon. It was too early – way too early. But as we reach peak Cloud adoption, with rates of uptake reaching 93%, the sky’s the limit for digital identity. Cloud computing has…
Read more

What Happens If… Disaster Recovery for the Smart City and Beyond

Crisis planning is integral to many cities across the planet and we see it in use when natural disasters strike. When the magnitude 9 earthquake hit Japan in 2011, previous disaster planning kicked in. But the response has been criticized because of the predictive limitations that informed the disaster recovery attempts. Other criticisms highlighted too…
Read more