History

Co-founders Marc Vanmaele and Nils Meulemans started this activity already in 1997, as it was anticipated that the Internet Era would nog only boost the demand for security solutions, but also introduce new requirements for e-business. 

“Security is a business-enabler”

Based on the knowledge and experience obtained in large scale projects and the ability to listen carefully to the customer, the founders of SecurIT decided to extend the offerings with ‘best of breed’ software products in adjacent areas of the IAM domain and develop our own software products. The SecurIT portfolio contains solutions from vendors such as IBM, CyberArk, RSA Aveksa and our SecurIT products such as TrustBuilder and D-Man. Through a worldwide partner network, SecurIT sells and support its software solutions to large organizations outside the Benelux.

The company is extensively using the IBM Security portfolio (IBM Security Identity Manager, IBM Security Access Manager, IBM Security Federated Identity Manager etc.). Today we are proud to be IBM’s most knowledgeable business partner in Europe.

Companies, like yours, are doing more and more business by using internet. Therefore you must open your IT systems for customers, suppliers and business partners both at the supply chain level and in the area of customer relationship management. You have to find a way of letting The Good Guys in… in a controlled way. Security management is a key factor in the realization of this. Security management concerns your business applications and information systems on the one hand, and users – both internal and external – on the other hand. Authorization management is a very important part of this. Scalability and availability are vital aspects of such an enterprise infrastructure. We enable you to open your business-critical applications to Internet and Intranet users, and manage user profiles in a cost-effective way. Automatically generated reports help you to manage and control activities on your systems and satisfy the requirements of regulations rules.

Let us help you to secure the gates. The portfolio of leading software products and our own products – are cornerstone components for the implementation of a secure solution, full of vision and perspective.