Identity and access management

 

Threat-aware identity and access management for the open enterprise

Today's organizations need to govern and enforce user access across multiple channels, including mobile, social and cloud while meeting business needs such as role management, compliance and audit reporting and integration of various user populations.

IBM Security addresses these issues with industry-leading software, services and appliances that strengthen compliance and mitigate risk. Together, they help organizations, support business policies, and protect and monitor user access in today's multi-perimeter environments.

  • IBM

    See clearly in the cloud with identity and access management

    Discover how to strengthen security in each of the cloud delivery models

  • IBM

    IBM Security Identity and Access Management Buyer’s Guide

    Assistance evaluating identity and access management solutions.

The IBM Security threat-aware identity and access management portfolio helps you protect valuable data and applications with context-based access control, security policy enforcement and business-driven identity governance. Armed with user metrics and audit reports, you can deal more quickly and efficiently with the complexities of user access and advanced threats.

The IBM Security identity and access management portfolio helps you protect identity as a new perimeter with controls to manage and report on user entitlements and access activities.

Identity and access management software from IBM helps you:

What We Offer

See more identity and access management products.


Threat-aware identity and access management for the open enterprise

Today's identity and access management software can support business goals as well as IT security needs. By deploying integrated solutions that streamline identity and access management processes and provide user access audits and reporting, organizations can not only protect critical resources from security threats, but also enforce governance and security policies, maintain compliance with the latest regulations and support new business models.

IBM Security identity and access management software and appliances are integrated to help you quickly implement robust identity and access controls and improve security and support compliance initiatives. They are scalable and deliver high performance for even the largest implementations. At the same time, they can defend perimeters against increasingly sophisticated cybercriminals and malicious insiders by auditing and reporting on suspicious anomalies or non-compliant behavior. IBM identity governance solutions also help organizations enforce separation of duty restrictions, set appropriate user entitlements based on job function and implement security policies.

With IBM Security identity and access management software, you can connect users to information simply and securely, meet compliance needs and reduce operational costs.

It addresses the following four imperatives:

Safeguard mobile, cloud and social access

Prevent advanced insider threats

Simplify cloud integrations and identity silos

Deliver actionable identity intelligence

Demos and Videos

  • Implementing Identity and Access Management at British American Tobacco

    Implementing Identity and Access Management at British American Tobacco

  • Defend Your Multi-Perimeter Organization with Threat-Aware IAM

    Defend Your Multi-Perimeter Organization with Threat-Aware IAM

  • Strengthen identity assurance with IBM Security Identity Manager

    Strengthen identity assurance with IBM Security Identity Manager

Analyst reports

  • Gartner Predicts 2014: Identity and Access Management

    Gartner Predicts 2014: Identity and Access Management

    Read Gartner’s review of the nexus of forces influencing complex shifts in identity and access management

  • KuppingerCole 2014 Cloud IAM/IAG Leadership Compass report

    KuppingerCole 2014 Cloud IAM/IAG Leadership Compass report

    See why KuppingerCole considers IBM an overall Leader in cloud identity and access management/governance security.

  • IDC Product Flash: IBM Releases Threat-Aware and Identity Life-Cycle Management for Mobile, Cloud, and Enterprise

    IDC Product Flash: IBM Releases Threat-Aware and Identity Life-Cycle Management for Mobile, Cloud, and Enterprise

    IDC looks at the recent IBM announcement of threat-aware identity and access management with a focus on "enabling identity as the new security perimeter."

  • IBM Receives Frost & Sullivan Award for its Mobile IAM Solutions

    IBM Receives Frost & Sullivan Award for its Mobile IAM Solutions

    Analyst firm Frost & Sullivan ranks IBM "best in class" for mobile access security.

  • Identity and Access Intelligence: transforming enterprise security

    Identity and Access Intelligence: transforming enterprise security

    Protect critical IT assets, improve compliance, and address potential threats

  • Secure the enterprise with confidence

    Secure the enterprise with confidence

    Examining the security infrastructure landscape to detect threats and protect the reputation of an enterprise

White Papers

  • IBM

    See clearly in the cloud with threat-aware identity and access management

    Learn how to securely connect people, applications and devices to cloud environments

  • IBM

    Manage identities & access for continuous compliance and reduced risk

    Deploy and manage critical identity and access management controls within cloud environments

  • IBM

    When millions need access

    Identity management in an interconnected world

  • IBM

    Mitigating risks with security intelligence and identity assurance

    Help defend against insider threats, manage access and boost compliance

  • IBM

    Get actionable insight with security intelligence for mainframe environments

    Protect against threats affecting mainframe and distributed systems

  • IBM

    Protect the Mobile Enterprise with Smarter Security

    Prevent fraud and improve the user experience

References and Case Studies

  • IBM

    ADP

    Strengthens security with identity management initiative

  • IBM

    Flemish Government

    Providing seamless access for citizens

  • IBM

    Whirlpool Corporation

    Reduces the cost and complexity of identity management across SAP and enterprise applications

  • IBM

    Cochlear Limited

    Enterprise portal and web content management drives consistent online presence

  • IBM

    Generali Deutschland Group

    Sellers drive new revenue and improve service with advanced segmentation analytics

  • IBM

    Blue Cross and Blue Shield of Kansas

    Cuts mainframe costs with IBM

  • IBM

    A leading credit services provider in Asia

    Reduces risk and increases profitability with an advanced access management solution

Webcast

  • Webcast: Identity & Access – for the Cloud & from the Cloud

    Learn how IAM can help secure your applications in the cloud

Buyers Guide

  • IBM

    IBM Security Identity and Access Management Buyer’s Guide

    Assistance evaluating identity and access management solutions


Not in United States?

Contact IBM

Considering a purchase?

Threat Aware Identity and Access Management for the Open Enterprise

Threat Aware Identity and Access Management for the Open Enterprise (00:02:27)

Concerned about visibility and control in the cloud?

  • Adopt cloud with confidence using IBM Dynamic Cloud Security

    Learn more


IBM Acquires Lighthouse to Help Streamline IAM for Mobile, Social and Cloud

This cloud security services provider protects identity and data in an increasingly complex IT environment
Learn more


What leading analysts are saying about IBM’s acquisition of CrossIdeas

CrossIdeas’ solutions offer a business-centric focus on identity governance and analytics.
Learn more

IBM X-Force Threat Intelligence Quarterly

A closer look at today's security risks. 

Read the latest report

Related links

Same product, new name!

The product you selected is now offered under a new name. The product page you will be taken to will reflect this new name.