Introduction to Identity and Trust

In today's complex identity management landscape, information is often fragmented across various products, resulting in siloed data and incomplete identity profiles. Configuring identity directories for each product, and sometimes each table in a product, further complicates the process.

Identity and Trust (formerly known as Infinity Identity) addresses the challenges of managing a comprehensive on-premises Identity Data Architecture (IDA) setup for large and distributed environments, with a focus on the implementation of identity-based Zero Trust access control to enhance security and streamline identity management.

Key Highlights

  1. Seamless integration

    • Supports integration with existing Check Point solutions.

    • Compatible with third-party identity tools, to ensure broad applicability.

  2. Centralized Management

    • Consolidates management of all IdPs and directories into a single interface.

    • Reduces administrative overhead and enhances operational efficiency.

  3. Real-time Data Synchronization

    • Aggregates identity information from multiple sources to provide a holistic, up-to-date view of the identity landscape.

    • Enables dynamic decision-making for security and access controls

To get started, refer to the Getting Started with Identity and Trust section for setup instructions.