Over 50% growth in use of digital documents between 2022 and 2026

Issue 2 2022 Access Control & Identity Management, Security Services & Risk Management

A new study from Juniper Research has found that the number of users of digital identity documents globally will exceed 6,5 billion by 2026, from 4,2 billion in 2022. This expansion of over 50% has been accelerated by the pandemic and reflects the growing importance of digital identity in sectors such as government services.

A digital identity document is a digital representation of a physical identity document.

The new research, Digital Identity: Key opportunities, regulatory landscape and market forecasts 2022-2026, found that ease and equality of access are critical factors for the use of digital identity in government services. The research recommends that governments partner with digital identity vendors with diverse identity datasets to ensure an inclusive digital transformation in eGovernment.

The research found that digital identity cards, where digital details are loaded onto an identity card, will be used by over 4 billion people globally in 2026, from 2,5 billion in 2022. This ongoing digitisation is a prerequisite for many digital initiatives within eGovernment and will allow significant digital enablement over the next five years.

Research co-author Damla Sat explained: “Identity cards have been controversial in some countries due to privacy concerns, but they are a well-established mechanism for digitising identity practices. If third-party access is governed correctly, identity cards can be at the centre of the digital identity market, but they need to be backed by robust processes.”

The research found that while eCommerce fraud has been rife, government services must not be ignored from a verification perspective. As government-issued documents are critical to identity processes, any compromising of these documents is very risky. Therefore, governments issuing digital identity documents must work with verification vendors who offer a variety of different verification scenarios across use cases, or they will fail to secure this high-risk fraud avenue.

Download the whitepaper at www.juniperresearch.com/whitepapers/digital-identity-realising-critical-opportunities




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Intelligent access at the gate
Access Control & Identity Management Residential Estate (Industry)
LD Access provides a smart, streamlined approach to boom gate security, enhancing the verification of people and vehicles before entry. Through its Self-Service Scanning Kiosk and Mobile Scanning Unit, LD Access delivers secure, automated access control.

Read more...
Identity-led security in banking
Secutel Technologies Access Control & Identity Management Products & Solutions
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
Who has access to your face?
Access Control & Identity Management AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.