For safe- and reliable access management.
A key-player in Federal Government, Healthcare, and Finance.

Read More
Z

Governance

Be sure your organization adheres to its rules of conduct. Provide your board with the tools to manage its processes and systems.

 

~

Security

Allow systems and assets to be accessed only by authorized users.

 

Cloud

Build a public, private, or hybrid Cloud service, according to the unique needs of your organization.

 

 

Access

Grant access to authorized users, physically or digitally, in a simple and reliable manner.

 

Realized connectors

Managed accounts

Average project length (months)

IAM products

For a review of our products see our  IAM Products

A preview of our clients and projects

For a review of our clients see IAM Projects

What we offer

Trusted-ID has a standard framework for Identity and Access Management, that connects the most important systems in a company, such as HRM and AD, with IDM. Our knowledge of federation allows us to make connections beyond organizational boundaries as well as shaping your authorization management via XACML, once and for all. Other standard products, such as portals that are built in a flexible and dynamic manner, are ever present in our arsenal.

We deliver solutions (e.g. IMRA) with fixed prices and fixed delivery times. No hidden costs.

 

Our mission at Trusted-ID is to make Identity & Access Management (IAM) accessible, reliable, and safe for everyone. It is important to us that identities are well-managed in every phase of a project. Thus, we always give valuable IAM input and develop solutions that are flexible, scalable, and affordable.

  • Consultancy 95%
  • Product development 80%
  • Management 45%
  • Pedantic humor 80%

Our way of working

 

Agile & DSDM

We work in sync with the DSDM method but in daily proceedings we adhere to Agile/Scrum tactics. A main advantage of working this way is that we receive much input and feedback from our clients, which enables us to realize their vision faster.

 

 

DTAP

When developing products we follow the standard method of Development, Testing, Acceptance, Production to protect and guarantee the quality of our products. Next to DTAP, we are proponents of Test Driven Development and UX design because we believe every aspect of a project can be delivered within a fixed time range.

 

Aftercare

We have a reputation to uphold and that means giving much attention to aftercare. We work both on-site as well as remotely and offer training and workshops for when a client is in the middle of change.

 

Frequently Asked Questions

Identity and Access Management (IAM) covers: Identity Life Cycle Management (ILM), IAM, FIM, ADFS, Active Directory, Cloud computing, Compliance, Single Sign On, Federation, SyncEngine, XACML,  MIS, Management Agents,  and many more. Besides that, Identity and Access Management is a process in which the current situation of an organization is mapped, analyzed, and optimized depending on the context. For example, a ministry has very different demands and needs compared to an oil company. Check out our FAQ page. For specific questions contact one of our architects.

Which partners do we work with?

We have close working relations with the federal government, Microsoft, CA, multiple Dutch municipalities, and Oxford Computer Group.

 

What is the average implementation time of our solutions?

The timeframe in which a product is shipped or a solution is implemented is dependent on the phase in which an organization is currently in. On average we can develop and implement within 3 months.

For more information please contact Darryl Karamat-Ali on phonenumber +31 88 427 16 55 or send an e-mail to info@trusted-id.eu

I want to know more!

You can read our FAQ for more information. For personal advice you canalways contact one of us at Trusted-ID or send us an e-mail

 

Don't be shy!

Want to know more? Contact us via +31 88 427 16 55 or send us an email via the button below!

E-mail