Identity and access management

 

Threat-aware identity and access management for the open enterprise

Rapid adoption of new applications, mobile devices and cloud services opens the borders of the enterprise, exposing sensitive information to outside devices. This new, borderless enterprise calls for a more identity-centric focus on security. The IBM Security threat-aware approach combines industry-leading identity and access management software and appliances with security analytics, arming you with tools to help detect anomalies, prevent fraud, block attacks and provide secure user access in today's mobile, cloud and social environments.

  • IBM

    IBM Security Identity and Access Management Buyer’s Guide

    Assistance evaluating identity and access management solutions

  • IDC Product Flash

    IDC Product Flash: IBM Releases Threat-Aware and Identity Life-Cycle Management for Mobile, Cloud and Enterprise

    IDC reviews IBM Security threat-aware identity and access management software for "enabling identity as the new security perimeter.”

The IBM Security identity and access management portfolio helps you protect identity as a new perimeter with controls to manage and report on user entitlements and access activities.

Identity and access management software from IBM helps you:

What We Offer

See more identity and access management products.

 

Threat-aware identity and access management for the open enterprise

Today's identity and access management software needs to do more than just provision/de-provision employees and enforce appropriate role-based access to corporate resources. It also needs to consistently monitor access by different user groups, from employees to partners to consumers, and protect sensitive information wherever it resides.

IBM identity and access management software and appliances are integrated to help you quickly implement robust identity and access controls and improve security and support compliance initiatives. They are scalable and deliver high performance for even the largest implementations. At the same time, they can defend perimeters against increasingly sophisticated cybercriminals and malicious insiders by auditing and reporting on suspicious anomalies or non-compliant behavior.

IBM Security identity and access management software helps you connect users to information simply and securely, meet compliance needs and reduce operational costs. It addresses the following four imperatives:

Safeguard mobile, cloud and social access

Prevent advanced insider threats

Simplify cloud integrations and identity silos

Deliver actionable identity intelligence

Demos and Videos

  • Implementing Identity and Access Management at British American Tobacco

  • Prevent Insider Threats with IBM Security Privileged Identity Manager

Analyst reports

  • Identity and Access Management

    Gartner Predicts 2014: Identity and Access Management

    Read Gartner’s review of the nexus of forces influencing complex shifts in identity and access management

  • Web Access Management

    Gartner MarketScope Report for Web Access Management

    Discover which web access management features your peers are looking to get at a lower cost and more.

  • IDC Product Flash

    IDC Product Flash: IBM Releases Threat-Aware and Identity Life-Cycle Management for Mobile, Cloud, and Enterprise

    IDC looks at the recent IBM announcement of threat-aware identity and access management with a focus on "enabling identity as the new security perimeter.”

  • 2014...

    IBM Receives Frost & Sullivan Award for its Mobile IAM Solutions

    Analyst firm Frost & Sullivan ranks IBM "best in class" for mobile access security.

  • Identity and Access Intelligence: transforming enterprise security

    Protect critical IT assets, improve compliance, and address potential threats

  • Secure the enterprise with confidence

    Examining the security infrastructure landscape to detect threats and protect the reputation of an enterprise

White Papers

  • IBM

    Avoiding Insider Threats to Enterprise Security

    Learn how to enhance security by controlling privileged identities.

  • IBM

    Manage identities & access for continuous compliance and reduced risk

    Deploy and manage critical identity and access management controls within cloud environments

  • .

    When millions need access

    Identity management in an interconnected world

  • IBM

    Get actionable insight with security intelligence for mainframe environments

    Protect against threats affecting mainframe and distributed systems

  • IBM

    Protect the Mobile Enterprise with Smarter Security

    Prevent fraud and improve the user experience

References and Case Studies

  • IBM

    ADP

    Strengthens security with identity management initiative

  • IBM

    Flemish Government

    Providing seamless access for citizens

  • IBM

    Generali Deutschland Group

    Sellers drive new revenue and improve service with advanced segmentation analytics

  • IBM

    Blue Cross and Blue Shield of Kansas

    Cuts mainframe costs with IBM

Webcast

  • Go Mobile But Be Safe - User Access Security should top your BYOD agenda

    Learn why mobile access security is critical

Buyers Guide

  • IBM

    IBM Security Identity and Access Management Buyer’s Guide

    Assistance evaluating identity and access management solutions

 

Not in United States?

Contact IBM

Considering a purchase?

Threat Aware Identity and Access Management for the Open Enterprise

Threat Aware Identity and Access Management for the Open Enterprise (00:02:27)

IBM receives Frost & Sullivan Customer Value Leadership Award for its Mobile Identify and Access Management Solutions. Learn more.

IBM X-Force Threat Intelligence Quarterly 2Q 2014

IBM X-Force Threat Intelligence Quarterly Q2 2014Discover how application vulnerabilities, spam threats and incident response are evolving— based on the latest data and ongoing analysis

Download now

Related links

Prevention is possible. Discover how the latest advances in Threat Protection can keep your organization safe.

Same product, new name!

The product you selected is now offered under a new name. The product page you will be taken to will reflect this new name.