TrustBuilder provides a flexible way to work with multiple Authentication and Authorisation mechanisms and that can easily be extended to future models of Identity Data Services.
D-Man is a product for monitoring and managing large e-business environments. It allows the organization to proactively capture the status of a distributed environment consisting of Web Servers, Web Proxies, Application Servers, Directory Servers (LDAP) and Security Servers.
RoleManager is a plug-in for IBM Tivoli Identity Manager that helps organizations to streamline the modelling and remodelling of their identity management system.
Its products play a key role in the Security Infrastructure at some of the largest organisations across the world, like ING Group, Fortis Bank, Eurocontrol, Ahold, Delta Lloyd (Benelux), WestLB, Wincor-Nixdorf Portavis, T-Mobile (DE), UBS (Sw), Telefonica (UK), Rabobank, BB&T (US), Banco Santander (Mexico), Great-West Life (Ca), etc.
|May 05 ‑ May 08, 2009||
European Identity Conference 2009
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
|May 03, 2011||
Snapshot: SecurIT TrustBuilder - 70381
SecurIT TrustBuilder is a Versatile Authentication Server (VAS) provided by the Belgian company SecurIT. The product started as add-on for IBM Tivoli Access Manager but right now works with a…
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
The proverbial Computing Troika that KuppingerCole has been writing about for years does not show any signs of slowing down. The technological trio of Cloud, Mobile and Social computing, as well as their younger cousin, the Internet of Things, have profoundly changed the way our society works. [...]
Traditional tools are still widely deployed by many organizations and in certain scenarios serve as a useful part of enterprise security infrastructures, but recent trends in the IT industry have largely made them obsolete. Continued deperimeterization of corporate networks because of adoption of cloud and mobile services, as well as emergence of many new legitimate communication channels with external partners has made the task of protecting sensitive corporate information more and more difficult. The focus of information security has gradually shifted from perimeter protection towards [...]