Features that turn identity data into confident decisions.

Identity Armour combines governance workflows, telemetry, and the Verdikta Confidence Engine so you can evaluate every identity and session in real time.

Identity & tenant modeling

Model tenants, identities, and admin roles explicitly. Identity Armour keeps tenant boundaries clear while still giving centralized operators visibility and control across your estate.

  • Tenant-aware routing and isolation at the API gateway.
  • Platform and tenant admin roles with least-privilege defaults.
  • Baseline data for identities and tenants to track drift.

Verdikta Confidence Engine

Verdikta continuously evaluates every access attempt, combining device posture, behavioral analytics, and geo-risk to produce a risk score per session.

  • Device posture signals: OS version, patch level, encryption, firewall, and more.
  • Behavioral analytics: suspicious patterns in access time, frequency, and resource usage.
  • Geo-risk insights: VPN/Tor/proxy detection and anomalous travel speed.
  • Allow, challenge, or deny decisions mapped to configurable thresholds.

Governance workflows & dashboards

Give operators, auditors, and security teams the views they need to understand identity risk and prove compliance.

  • Dashboards for identity posture across tenants.
  • Drill-down views for high-risk identities and recent anomalies.
  • Exportable data to feed into your SIEM, GRC, or ticketing systems.

Audit-friendly by design

Every decision flows through the API gateway and can be captured as an immutable audit event, giving you evidence for internal and external audits.

  • Per-request evaluation traces and risk scores.
  • Governance actions (approvals, overrides) tracked with context.
  • Configurable retention and export so records align with your regulatory obligations.