websights Customer Archives - TrustBuilder

Looking for inwebo.com? You are in the right place! Read all about it in our blog post

Come and join us in person at upcoming industry trade shows and conferences

Risk-based access


As the number of threats is rising, organizations need to step up their efforts in only allowing those users access that are verified. Risk-based access provides an extra level of security by analyzing user behavior and requiring extra information when necessary.

Policy information broker


Augment the user journey in your access management flow with TrustBuilder’s Policy Information Broker. The PIB allows you to connect to any application or database and draw conclusions based on external data. It can do complex calculations and derive properties of a user with relevance for access control. The outcome can then be used to execute a workflow, e.g. to take access decisions or to enrich user profiles.

Access orchestration


Orchestration is at the heart of any Identity and Access Management (IAM) system. All requests for access to applications or resources pass through the orchestrator. This allows us to provide a seamless user experience as far as identity, authentication and access control is concerned.

Adaptive authentication


Combine a friction-free user experience with optimal security. Offer your user the authentication solution that suits their phase in the customer journey and takes into account their location, device reputation or the value of a transaction.

Contextual authentication


Understand the context (IP address, time, location…) of the user. Take that context into account before granting them access to resources or applications. Adapt the security policy that you apply to the context and the sensitivity of the data users want to access. Use the appropriate authentication method based on that context to reach the appropriate level of security without compromising customer experience. Allow passwordless authentication, Federated Identification and Single Sign-on to give users a basic level of access and apply adaptive authentication, but only when necessary.

Persona Selection


Allow your users to use just one profile for any persona they assume. Whether they want to connect as an employee, a customer, a partner, or an external contractor, let them use one profile rather than having to use different credentials, depending on their persona. Reduce administrative costs by switching from role-based access control to a policy-based approach.

Consent management


Ask users for consent to store and share their data. Allow users to give and revoke consent upon onboarding. Make it easy for users to manage their own consent in a self-service portal. Give users control over their data: allow them to decide what personal data are stored in your user database and what attributes are shared with Identity Providers (IdPs) and applications. As a European IAM vendor, TrustBuilder attaches great importance to compliance with all privacy regulations, both European and local regulations, throughout the consent lifecycle.

Consent enforcement


Don’t limit yourself to simply asking users for their consent. Ensure that your entire organization adheres to regulations like GDPR by enforcing compliance through strong policies throughout the consent lifecycle. As a European IAM vendor, TrustBuilder knows and enforces all legislation on privacy. Ensure end-to-end compliance when sharing personal data with external applications. By using TrustBuilder, you provide users with the peace of mind that their data are in safe hands and consents are adhered to.

Document verification


Be 100% sure of a person’s identity by complementing official documents with biometric verification.



Allow users to use a third party as an Identity Provider. Let users move between systems quickly and securely, enhancing customer experience. Improve security and ease administration by trusting the identity credentials assured by a partner company or domain.