Identity and access management

 

Threat-aware identity and access management for the open enterprise

Today's organizations need to govern and enforce user access across multiple channels, including mobile, social and cloud. At the same time, they must address business needs such as role management, compliance and audit reporting and integration of various user populations.

IBM® Security identity and access management solutions help strengthen compliance and reduce risk by protecting and monitoring user access in today's multi-perimeter environments.

IBM Security identity and access solutions help safeguard valuable data and applications with context-based access control, security policy enforcement and business-driven identity governance. Armed with user metrics and audit reports on user entitlements and access activities, you can deal more quickly and efficiently with the complexities of user access management, insider threats and compliance requirements.

Identity and access management solutions from IBM help:

Featured offers

With IBM Security identity and access management products, you can connect users to information simply and securely, meet compliance needs and protect critical assets across the open enterprise

These products include:


  • IBM Security Directory Integrator

    IBM Security Directory Integrator

    Helps you build an authoritative data infrastructure by integrating data from directories, databases, collaborative systems, applications and other data sources.

  • IBM Security Identity Manager

    IBM Security Identity Manager

    Enables organizations to drive effective identity management and governance across the enterprise.

  • IBM Security zSecure Admin

    IBM Security zSecure Admin

    Automates and simplifies IBM Resource Access Control Facility (RACF®) security and compliance administration for mainframe environments.

Demos and Videos

  • Implementing Identity and Access Management at British American Tobacco

    Implementing Identity and Access Management at British American Tobacco

  • Defend Your Multi-Perimeter Organization with Threat-Aware IAM

    Defend Your Multi-Perimeter Organization with Threat-Aware IAM

  • Strengthen identity assurance with IBM Security Identity Manager

    Strengthen identity assurance with IBM Security Identity Manager

Analyst reports

  • Gartner Predicts 2014: Identity and Access Management

    Gartner Predicts 2014: Identity and Access Management

    Read Gartner’s review of the nexus of forces influencing complex shifts in identity and access management

  • Gartner 2015 Magic Quadrant report for IGA

    See why Gartner selects IBM as a leader.

  • IDC Product Flash: IBM Releases Threat-Aware and Identity Life-Cycle Management for Mobile, Cloud, and Enterprise

    IDC Product Flash: IBM Releases Threat-Aware and Identity Life-Cycle Management for Mobile, Cloud, and Enterprise

    IDC looks at the recent IBM announcement of threat-aware identity and access management with a focus on "enabling identity as the new security perimeter."

  • IBM Receives Frost & Sullivan Award for its Mobile IAM Solutions

    IBM Receives Frost & Sullivan Award for its Mobile IAM Solutions

    Analyst firm Frost & Sullivan ranks IBM "best in class" for mobile access security.

  • KuppingerCole 2014 Cloud IAM/IAG Leadership Compass report

    KuppingerCole 2014 Cloud IAM/IAG Leadership Compass report

    See why KuppingerCole considers IBM an overall Leader in cloud identity and access management/governance security.

  • Identity and Access Intelligence: transforming enterprise security

    Identity and Access Intelligence: transforming enterprise security

    Protect critical IT assets, improve compliance, and address potential threats

  • Secure the enterprise with confidence

    Secure the enterprise with confidence

    Examining the security infrastructure landscape to detect threats and protect the reputation of an enterprise

White Papers

  • IBM

    See clearly in the cloud with threat-aware identity and access management

    Learn how to securely connect people, applications and devices to cloud environments

  • IBM

    Manage identities & access for continuous compliance and reduced risk

    Deploy and manage critical identity and access management controls within cloud environments

  • IBM

    When millions need access

    Identity management in an interconnected world

  • IBM

    Mitigating risks with security intelligence and identity assurance

    Help defend against insider threats, manage access and boost compliance

  • IBM

    Get actionable insight with security intelligence for mainframe environments

    Protect against threats affecting mainframe and distributed systems

  • IBM

    Protect the Mobile Enterprise with Smarter Security

    Prevent fraud and improve the user experience

References and Case Studies

  • IBM

    ADP

    Strengthens security with identity management initiative

  • IBM

    Flemish Government

    Providing seamless access for citizens

  • IBM

    Whirlpool Corporation

    Reduces the cost and complexity of identity management across SAP and enterprise applications

  • IBM

    Cochlear Limited

    Enterprise portal and web content management drives consistent online presence

  • IBM

    Generali Deutschland Group

    Sellers drive new revenue and improve service with advanced segmentation analytics

  • IBM

    Blue Cross and Blue Shield of Kansas

    Cuts mainframe costs with IBM

  • IBM

    A leading credit services provider in Asia

    Reduces risk and increases profitability with an advanced access management solution

Webcast

  • Webcast: Identity & Access – for the Cloud & from the Cloud

    Learn how IAM can help secure your applications in the cloud

Buyers Guide

  • IBM

    IBM Security Identity and Access Management Buyer’s Guide

    Assistance evaluating identity and access management solutions

Not in United States?

Contact IBM

Considering a purchase?

Same product, new name!

The product you selected is now offered under a new name. The product page you will be taken to will reflect this new name.