Technology

Step 1

Low Code Integration 

Organization uploads user database through ITATEM API

Step 2

User/Endpoint Onboarding

The User is the Administrator of their Identity and onboards with minimally intrusive UX.

Step 3

Authentication Request Initiated

User/endpoints log-in with no change to their front-end process, while the request is frozen to allow ITATEM Identity Router running as the backend to determine authenticity of requestor.

Step 4

Authentication Database

Access is determined by Authentication Database which also stores location of the User’s Identity Bank. Organization maintains administration of Access Control List and risk tolerances.

Step 5

Re-Encrypted Request

Request is re-encrypted and routed to appropriate Identity Bank. Every step of the authentication request is encrypted above AES256.

Step 6

Identity Bank Storage

ITATEM Identity Banks store User/Endpoint Heuristics and are geographically located to comply with local privacy regulations.

Data is encrypted and siloed to prevent lateral movement.

Step 7

Adaptive Trust Engine

The ITATEM Adaptive Trust Engine continuously learns user/end point behaviors to maximize identity scores.

The ITATEM Engine cross references these heuristics with the authentication request and determines appropriate permissive action.

This AI driven system adapts and updates heuristics to provide a more holistic and secure Identity Authentication process.