Early Access

Stay Informed. Be the First to Access ZeroTrust IAM.

ZeroTrust IAM is currently in advanced prototype stage. Leave your email below to receive early access updates, product announcements, and our free Zero-Trust IAM guide.

Get Early Access

Join our waiting list and be the first to hear when ZeroTrust IAM opens for enterprise evaluation.

πŸ“‹

Email Sign-Up Form

Click Here To Sign Up

Ready to See ZeroTrust IAM in Action?

Whether you're evaluating Zero-Trust solutions for your organisation or exploring AI-powered IAM for your security strategy, we'll walk you through a live demonstration.

In a ZeroTrust IAM demo, you'll see:

  • Real-time behavioural biometric capture in action
  • The Isolation Forest model flagging anomalous login behaviour
  • The Keycloak plugin blocking a suspicious session β€” live
  • How ZeroTrust IAM integrates with your existing identity infrastructure
Request a Demo β†’
Learn How It Works

Prototype Stage Notice

ZeroTrust IAM is a validated research prototype achieving 90% anomaly detection accuracy in formal testing. It demonstrates a production-viable architecture and is available for evaluation and integration research. Enterprise productionisation in progress.

Frequently Asked Questions

Does ZeroTrust IAM replace my existing IAM system? +

No. ZeroTrust IAM is designed to augment, not replace, your existing Keycloak IAM infrastructure. It adds a continuous behavioural verification layer without requiring you to rebuild your identity stack. If you're already running Keycloak, deployment is simply a plugin installation.

Will users notice any difference? +

No. Behavioural data is captured silently in the background during the standard login interaction using a lightweight JavaScript collector. There is no additional step, prompt, hardware requirement, or visible change for end users. Legitimate users experience absolutely no friction.

How quickly can the system detect anomalies? +

Anomaly scoring occurs in real time during the login flow itself. If a session is flagged as anomalous, the Keycloak plugin blocks access before the user is authenticated β€” typically within milliseconds. There is no post-login monitoring delay or batch processing window.

What data is collected? Is it private? +

ZeroTrust IAM collects only interaction metadata β€” timing, speed, and movement patterns. No keystrokes, no passwords, and no personally identifiable information are stored. All behavioural data is processed in-memory during the session and is not persisted to a database in the current prototype implementation.

Does the system need training data to work? +

ZeroTrust IAM uses an unsupervised Isolation Forest model β€” meaning it does not require any pre-labelled attack data to function. The system requires a short behavioural baseline training phase per user to establish normal behaviour patterns. After that, it detects anomalies automatically without any ongoing manual supervision.

Is ZeroTrust IAM production-ready? +

ZeroTrust IAM is currently a validated research prototype achieving 90% anomaly detection accuracy in formal testing. It demonstrates a production-viable three-tier microservices architecture and is available for evaluation and integration research. Enterprise-hardened productionisation β€” including TLS enforcement, persistent storage, and scalability testing β€” is the next development milestone.

⚠ The Next Breach Could Be Happening Right Now.

Don't Wait for a Session Hijack to Expose Your IAM's Limits.

ZeroTrust IAM provides the continuous, intelligent identity verification your organisation needs β€” built on Zero-Trust principles and powered by machine learning.