TrustBuilder provides a flexible way to work with multiple Authentication and Authorisation mechanisms and that can easily be extended to future models of Identity Data Services.
D-Man is a product for monitoring and managing large e-business environments. It allows the organization to proactively capture the status of a distributed environment consisting of Web Servers, Web Proxies, Application Servers, Directory Servers (LDAP) and Security Servers.
RoleManager is a plug-in for IBM Tivoli Identity Manager that helps organizations to streamline the modelling and remodelling of their identity management system.
Its products play a key role in the Security Infrastructure at some of the largest organisations across the world, like ING Group, Fortis Bank, Eurocontrol, Ahold, Delta Lloyd (Benelux), WestLB, Wincor-Nixdorf Portavis, T-Mobile (DE), UBS (Sw), Telefonica (UK), Rabobank, BB&T (US), Banco Santander (Mexico), Great-West Life (Ca), etc.
|May 05 ‑ May 08, 2009||
European Identity Conference 2009
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
|May 03, 2011||
Snapshot: SecurIT TrustBuilder - 70381
SecurIT TrustBuilder is a Versatile Authentication Server (VAS) provided by the Belgian company SecurIT. The product started as add-on for IBM Tivoli Access Manager but right now works with a…
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
WannaCry counts, without any doubt, amongst the most widely publicized cyber-attacks of the year, although this notoriety may not necessarily be fully justified. Still, it has affected hospitals, public transport, and car manufacturing, to name just a few of the examples that became public. In an [...]
Today, the Cyber Defence Center (CDC) or Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes [...]