Security & compliance posture.
Identity Armour is built with secure defaults and governance in mind so you can trust the decisions it makes and the data it collects.
Identity & access controls
- Tenant-aware admin roles with least privilege defaults.
- Separation of duties between platform admins and tenant admins.
- Optional enforcement of registered identities for access.
Data protection
- Support for strong secrets and encryption keys.
- Sanitized logging to avoid storing sensitive payloads.
- Configurable telemetry persistence aligned to your retention needs.
Continuous evaluation
- Verdikta Confidence Engine evaluates every access request.
- Device posture, geo-risk, and behavioral analytics feed into a single risk score.
- Policy-based outcomes: allow, challenge, or deny with traceability.
Audit & compliance
- Structured audit events for identity changes and access decisions.
- Support for external attestations through dashboards and data export.
- Designed to help you address common controls in frameworks like SOC 2 and ISO 27001.
Shared responsibility
Identity Armour is one part of your broader security program. We focus on identity, telemetry, and governance; you retain control over hosting, infrastructure, and surrounding operational processes.