Identity Risk

Security measures are only as good as the people or credentials you trust. Recent high profile data breaches have shined a spotlight on the risks of imposters masquerading as legitimate users or business partners to gain access to critical data and resources.


The information security industry is expected to top $75B in 2015, yet the primary focus remains on impeding network-based intrusions and malicious content in emails with very little focus on identity-based threats. To-date identity access management has been relegated to a reactive capability useful for audits and accountability, but hamstrung when it comes to proactive identity-based intrusions. The fact is that if your credentials seem legitimate, they are treated as legitimate. There has been no component of the security model focused on the ability to monitor, validate, and/or proactively deauthorize credentials that are deemed a threat.

Problems with Identity

  • Most credentials are user generated and of varying types & strengths
  • Even high assurance credentials are invisible to issuer after provisioning
  • Imposters denied access at one site can move on to other systems with impunity
  • Network & content-focused security are blind to these identity breaches

There Has Been No Monitoring Tool Focused on Identity Issues To-Date

By leveraging our experience as the creator and operator of Federated Trust, we were able to refine a decade of identity management and monitoring expertise into a suite of security products that help enterprise networks see what they trust and trust what they see. TrustMonitor™ analyzes the trust network by monitoring all issuers and credential metrics, while TrustValidator™ performs a vetting of the certificates used to sign emails and the security reputation of the certificate authorities.

Identity Risks

Information systems security is only as good as the people and credentials you trust. Recent high profile data breaches have shined a spotlight on the risks of “trusted” identities.

More info

Identity Availability

IT services are subject to identity-based availability issues, outages, and malicious attacks which can prevent user access to applications, emails, and other mission critical infrastructure and services.

More info

Evolving Identity

High-profile data breaches have demonstrated that credentials can no longer be taken at face value. The IT industry needs identity-based intrusion and threat analysis that is as evolved as network security tools.

More info

About CertiPath

CertiPath focuses on the use of digital identity in the modern connected world. Trusted digital identities are one of the most important components to securing your network, data and buildings but achieving ubiquitous trust online has been a challenge for 30 years.

Contact Us
  • Address: 1900 Reston Metro Plaza
    Suite 303, Reston, VA 20190, USA
  • Toll Free: 1.855.758.0075
  • Phone: 1.703.793.7870
  • Email:
© 2016 CertiPath®. All rights reserved. CertiPath® and the CertiPath® logo are trademarks of CertiPath®. Privacy  ⁄  Terms of Use