Risk-based access

As the number of threats is rising, organizations need to step up their efforts in only allowing those users access that are verified. Risk-based access provides an extra level of security by analyzing user behavior and requiring extra information when necessary.
Policy information broker

Augment the user journey in your access management flow with TrustBuilderās Policy Information Broker. The PIB allows you to connect to any application or database and draw conclusions based on external data. It can do complex calculations and derive properties of a user with relevance for access control. The outcome can then be used to execute a workflow, e.g. to take access decisions or to enrich user profiles.
MFA Windows Logon

Ask users to use TrustBuilder.io Mobile Authenticator to log on to their Windows PC or shared workstation. Enhance security by adding multi-factor authentication. Manage all possible access scenarios and configurations. Workstations are one of the most sensitive items in IT security, so increase security by offering users TrustBuilder MFA for Windows Logon.
Secure your Apps with Out-of-the-Box Multifactor Authentication MFA
Embed the most secure MFA solution into your apps with complete control over the branding. Disruptive cybersecurity technology that enhances both security and login experience. Contact us Strong authentication: all around cyber protection Protect your B2C (consumers), B2P (partners) and B2B2C applications. Protect your customersā data Secure transactions Simplify the login experience Meet compliance requirements […]
Access orchestration

Orchestration is at the heart of any Identity and Access Management (IAM) system. All requests for access to applications or resources pass through the orchestrator. This allows us to provide a seamless user experience as far as identity, authentication and access control is concerned.
Adaptive authentication

Combine a friction-free user experience with optimal security. Offer your user the authentication solution that suits their phase in the customer journey and takes into account their location, device reputation or the value of a transaction.
Contextual authentication

Understand the context (IP address, time, locationā¦) of the user. Take that context into account before granting them access to resources or applications. Adapt the security policy that you apply to the context and the sensitivity of the data users want to access. Use the appropriate authentication method based on that context to reach the appropriate level of security without compromising customer experience. Allow passwordless authentication, Federated Identification and Single Sign-on to give users a basic level of access and apply adaptive authentication, but only when necessary.
Persona Selection

Allow your users to use just one profile for any persona they assume. Whether they want to connect as an employee, a customer, a partner, or an external contractor, let them use one profile rather than having to use different credentials, depending on their persona. Reduce administrative costs by switching from role-based access control to a policy-based approach.
Consent management

Ask users for consent to store and share their data. Allow users to give and revoke consent upon onboarding. Make it easy for users to manage their own consent in a self-service portal. Give users control over their data: allow them to decide what personal data are stored in your user database and what attributes are shared with Identity Providers (IdPs) and applications. As a European IAM vendor, TrustBuilder attaches great importance to compliance with all privacy regulations, both European and local regulations, throughout the consent lifecycle.
Consent enforcement

Donāt limit yourself to simply asking users for their consent. Ensure that your entire organization adheres to regulations like GDPR by enforcing compliance through strong policies throughout the consent lifecycle. As a European IAM vendor, TrustBuilder knows and enforces all legislation on privacy. Ensure end-to-end compliance when sharing personal data with external applications. By using TrustBuilder, you provide users with the peace of mind that their data are in safe hands and consents are adhered to.