Digital Business using IoT

Thank you for your interest

You can download your three in-depth papers below. These will help you discover how identity management can empower digital business using IoT.

ForgeRock IoT White Paper
ForgeRock IoT White Paper
Accenture: The Internet of Things Revolutionizing Retail
Accenture: The Internet of Things Revolutionizing Retail
Accenture: Digital Business Era - Stretch Your Boundaries
Accenture: Digital Business Era - Stretch Your Boundaries

Get the Latest on ForgeRock

Blog

Privacy Matters. Trust Me.

Jan. 18, 2017

By Eve Maler

For security, privacy, identity, and digital transformation professionals, the occasion of Data Privacy Day is perfect for pondering the big issues, like: Has anything actually changed since last year? From where I sit, organizations have actually become more #PrivacyAware because they’ve had to, just to survive. The regulatory stakes are increasing rapidly, with the General…

Blog

The Connected Car: Digital Identity’s Next Stop

Jan. 2, 2017

By Ashley Stevenson

The relatively nascent and rapidly growing world of the connected car has yet to realize the business advantages that digital identity can bring to its vast ecosystem; but that’s about to change. From early internet screen names to connected devices of every kind, digital identity is everywhere. Receive a shiny new Apple watch over the…

Press release

ForgeRock to Demo Identity Management and Automotive Grade Linux Connected Car Implementation During CES 2017

Jan. 3, 2017

  Invite Only AGL Exhibit Jan. 5 – 6 at Bellagio Hotel   SAN FRANCISCO — Jan. 3, 2016 – ForgeRock®, the leading open platform provider of identity management solutions, today announced that it is showcasing its ForgeRock Identity Platform™ implemented with Automotive Grade Linux (AGL) during CES 2017 in the exclusive AGL Exhibit at the Bellagio…

In the news

Executive Viewpoint 2017 Prediction: ForgeRock – Eve Maler

Jan. 5, 2017

IoT security has needs that go far beyond the current scope of cloud and mobile challenges: use cases where dynamically introducing devices to each other is the highest goal, others where strong chip-backed security is essential, and still others that unavoidably mix the two. With recent security breaches and DDoS attacks, everyone can imagine scenarios that have disastrous consequences for industrial IoT infrastructure, however, the consequences are different but no less severe, and a killer requirement comes to the fore: privacy.