The New Visitor Experience
Condatis embarked on a project to revolutionise how travellers engage with a destination using decentralised identity and our product Cenda.
Continue readingCondatis embarked on a project to revolutionise how travellers engage with a destination using decentralised identity and our product Cenda.
Continue readingDiscover the transformation of the Education industry, including the learner experience, interoperability, and user ecosystems from education skills assessment to employment.
Continue readingUnderstand how organisations might address the challenges faced with current standards and what the new era of decentralisation looks like.
Continue readingExplore the transformative potential of verifiable credentials and their implications for various industries.
Continue readingMicrosoft have now announced the general availability of Entra External ID, which aims to provide a new customer-focused identity and access management (CIAM) solution as part of a push to consolidate all their identity products under the Entra umbrella. Dave Downs, Solutions Architect at Condatis explores everything you need to know about Microsoft Entra External ID.
Continue readingDriven by our 4 core values, we at Condatis take pride in ensuring these are at the heart of everything that we do. We are delighted to share with you our latest achievements and updates that reflect our ongoing commitment to growth, innovation, and social responsibility.
Continue readingDelve into the world of seamless traveller experiences and discover how digital identity fosters not only access management but also customer loyalty through hyper-personalisation. Read the summary of the debut episode of Verify This as she sits down with Gillian Jones, a seasoned Senior Business Development Manager at Condatis.
Continue readingIn the landscape of Higher Education, good student experience is of utmost priority for institutions, and with the phasing out of Microsoft Identity Manager (MIM), a new identity and access management system is required to streamline user lifecycles and ensure secure access to resources.
Continue reading