TrustBuilder provides a flexible way to work with multiple Authentication and Authorisation mechanisms and that can easily be extended to future models of Identity Data Services.
D-Man is a product for monitoring and managing large e-business environments. It allows the organization to proactively capture the status of a distributed environment consisting of Web Servers, Web Proxies, Application Servers, Directory Servers (LDAP) and Security Servers.
RoleManager is a plug-in for IBM Tivoli Identity Manager that helps organizations to streamline the modelling and remodelling of their identity management system.
Its products play a key role in the Security Infrastructure at some of the largest organisations across the world, like ING Group, Fortis Bank, Eurocontrol, Ahold, Delta Lloyd (Benelux), WestLB, Wincor-Nixdorf Portavis, T-Mobile (DE), UBS (Sw), Telefonica (UK), Rabobank, BB&T (US), Banco Santander (Mexico), Great-West Life (Ca), etc.
|May 05 ‑ May 08, 2009||
European Identity Conference 2009
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
|May 03, 2011||
Snapshot: SecurIT TrustBuilder - 70381
SecurIT TrustBuilder is a Versatile Authentication Server (VAS) provided by the Belgian company SecurIT. The product started as add-on for IBM Tivoli Access Manager but right now works with a…
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Who will have access to what? In a complex world where everyone and everything – people, things and services - will be connected everywhere and anytime through a global cloud, IAM is going to remain one of the strongest means to protect enterprise security. Especially when firewalls as security perimeters are not sufficient any more. To take over the leading protection task, however, the IAM technology has to change fundamentally. Particularly with digital transformation of businesses, IAM moves into the center of operations. The mere defining of roles for individual access [...]