ZeroTrust IAM is currently in advanced prototype stage. Leave your email below to receive early access updates, product announcements, and our free Zero-Trust IAM guide.
Join our waiting list and be the first to hear when ZeroTrust IAM opens for enterprise evaluation.
Whether you're evaluating Zero-Trust solutions for your organisation or exploring AI-powered IAM for your security strategy, we'll walk you through a live demonstration.
In a ZeroTrust IAM demo, you'll see:
ZeroTrust IAM is a validated research prototype achieving 90% anomaly detection accuracy in formal testing. It demonstrates a production-viable architecture and is available for evaluation and integration research. Enterprise productionisation in progress.
No. ZeroTrust IAM is designed to augment, not replace, your existing Keycloak IAM infrastructure. It adds a continuous behavioural verification layer without requiring you to rebuild your identity stack. If you're already running Keycloak, deployment is simply a plugin installation.
No. Behavioural data is captured silently in the background during the standard login interaction using a lightweight JavaScript collector. There is no additional step, prompt, hardware requirement, or visible change for end users. Legitimate users experience absolutely no friction.
Anomaly scoring occurs in real time during the login flow itself. If a session is flagged as anomalous, the Keycloak plugin blocks access before the user is authenticated β typically within milliseconds. There is no post-login monitoring delay or batch processing window.
ZeroTrust IAM collects only interaction metadata β timing, speed, and movement patterns. No keystrokes, no passwords, and no personally identifiable information are stored. All behavioural data is processed in-memory during the session and is not persisted to a database in the current prototype implementation.
ZeroTrust IAM uses an unsupervised Isolation Forest model β meaning it does not require any pre-labelled attack data to function. The system requires a short behavioural baseline training phase per user to establish normal behaviour patterns. After that, it detects anomalies automatically without any ongoing manual supervision.
ZeroTrust IAM is currently a validated research prototype achieving 90% anomaly detection accuracy in formal testing. It demonstrates a production-viable three-tier microservices architecture and is available for evaluation and integration research. Enterprise-hardened productionisation β including TLS enforcement, persistent storage, and scalability testing β is the next development milestone.
ZeroTrust IAM provides the continuous, intelligent identity verification your organisation needs β built on Zero-Trust principles and powered by machine learning.