All Research
Executive View
TrustBuilder Identity Hub is the Identity and Acess Management (IAM) platform from TrustBuilder that enables a context-aware and policy-driven approach to deliver a secure and seamless application integration. Targetted mostly at B2B and B2E use-case requirements, TrustBuilder is building on additional features to address the consumer IAM requirements.

1 Introduction

Identity & Access Management has come a long way since the inception of directory services and it is still actively evolving.

KuppingerCole’s view of IAM over time begins with an IAM in whose primary purpose was to prevent unauthorized access to secure resource. With its focus on access administration, the IAM core technology started to include Identity Provisioning as well as the core capabilities to authenticate, authorize and audit.

A further generation of IAM not only tried to prevent unauthorized access to a resource, but it also added the capability to detect it. Access Governance was included as a core technology for IAM with a focus on administration with business participation, and the ability to detect was partially due to integrations with Security Information and Event Management (SIEM) products making its way onto the stage.

In this latest iteration, IAM adds to its ability to prevent and detect by also providing the ability to respond to the security threats. New IAM technologies included Access Analytics and Intelligence. Analytics gives the ability to perform data analysis of historical data and uncover trends or pattern that can be used to improve the decision-making process, while Intelligence gives the ability to make access decisions that can be acted upon based on the patterns and trends found through data analytics. Together, access analytics and intelligence provide the ability not only detect, but to also respond to unauthorized access attempts. These new capabilities helped to fulfill the requirements of not only business but governance, compliance, and administration too. Integrations with Adaptive Authentication & Authorization, Real-Time Security Intelligence, Software Defined Environments and Privilege Management also needed to be supported by IAM today.

As the landscape of information security threats changes, so do the IAM capability requirements.

Reference Architecture – IAM Building Blocks
Figure 2: Reference Architecture – IAM Building Blocks

Founded as SecurIT in 1999, it transformed to TrustBuilder in December 2017. Identity and Access Management (IAM) software product of TrustBuilder Corporation is targeted at B2B, B2C and B2E IAM use-cases. With offices in Belgium, Netherlands, Germany, United Kingdom and the United States, TrustBuilder has a strong focus on enterprise IAM requirements of the Banking and Insurance industry.

Full article is available for registered users with free trial access or paid subscription.
Log in
Register and read on!
Create an account and buy Professional package, to access this and 600+ other in-depth and up-to-date insights
Register your account to start 30 days of free trial access
Get premium access
Choose a package

Stay up to date

Subscribe for a newsletter to receive updates on newest events, insights and research.
I have read and agree to the Privacy Policy
I have read and agree to the Terms of Use