Threat-aware identity and access management for the open enterprise
Today's organizations need to govern and enforce user access across multiple channels, including mobile, social and cloud. At the same time, they must address business needs such as role management, compliance and audit reporting and integration of various user populations.
IBM® Security identity and access management solutions help strengthen compliance and reduce risk by protecting and monitoring user access in today's multi-perimeter environments.
Learn how identity governance became key to compliance and risk control.
IAM Buyers Guide
Get assistance evaluating identity and access management solutions
IBM Security identity and access solutions help safeguard valuable data and applications with context-based access control, security policy enforcement and business-driven identity governance. Armed with user metrics and audit reports on user entitlements and access activities, you can deal more quickly and efficiently with the complexities of user access management, insider threats and compliance requirements.
Identity and access management solutions from IBM help:
With IBM Security identity and access management products, you can connect users to information simply and securely, meet compliance needs and protect critical assets across the open enterprise
These products include:
Simplifies the oversight of user roles and entitlements with business-driven identity governance and user lifecycle management.
Addresses mobile security challenges by proactively enforcing access policies for web environments and mobile collaboration channels.
Protects, automates and audits the use of privileged identities across the extended enterprise, including cloud environments.
Helps you build an authoritative data infrastructure by integrating data from directories, databases, collaborative systems, applications and other data sources.
Enables organizations to drive effective identity management and governance across the enterprise.
Automates and simplifies IBM Resource Access Control Facility (RACF®) security and compliance administration for mainframe environments.
All products - Identity and access management
- Access Management - Overview
- Directory Services - Overview
- IBM Security Identity and Access Assurance
- IBM Security Identity and Access Manager
- IBM Security zSecure suite
- Identity Governance and Management - Overview
Demos and Videos
Secure access in the era of mobile and cloud
Great customer service takes off at WestJet
How to protect access to sensitive data and applications
Implementing Identity and Access Management at British American Tobacco
Defend Your Multi-Perimeter Organization with Threat-Aware IAM
Strengthen identity assurance with IBM Security Identity Manager
Gartner Predicts 2014: Identity and Access Management
Read Gartner’s review of the nexus of forces influencing complex shifts in identity and access management
Gartner 2015 Magic Quadrant report for IGA
See why Gartner selects IBM as a leader.
IDC Product Flash: IBM Releases Threat-Aware and Identity Life-Cycle Management for Mobile, Cloud, and Enterprise
IDC looks at the recent IBM announcement of threat-aware identity and access management with a focus on "enabling identity as the new security perimeter."
IBM Receives Frost & Sullivan Award for its Mobile IAM Solutions
Analyst firm Frost & Sullivan ranks IBM "best in class" for mobile access security.
KuppingerCole 2014 Cloud IAM/IAG Leadership Compass report
See why KuppingerCole considers IBM an overall Leader in cloud identity and access management/governance security.
Identity and Access Intelligence: transforming enterprise security
Protect critical IT assets, improve compliance, and address potential threats
Secure the enterprise with confidence
Examining the security infrastructure landscape to detect threats and protect the reputation of an enterprise
See clearly in the cloud with threat-aware identity and access management
Learn how to securely connect people, applications and devices to cloud environments
Manage identities & access for continuous compliance and reduced risk
Deploy and manage critical identity and access management controls within cloud environments
When millions need access
Identity management in an interconnected world
Mitigating risks with security intelligence and identity assurance
Help defend against insider threats, manage access and boost compliance
Get actionable insight with security intelligence for mainframe environments
Protect against threats affecting mainframe and distributed systems
Protect the Mobile Enterprise with Smarter Security
Prevent fraud and improve the user experience
References and Case Studies
Strengthens security with identity management initiative
Providing seamless access for citizens
Reduces the cost and complexity of identity management across SAP and enterprise applications
Enterprise portal and web content management drives consistent online presence
Generali Deutschland Group
Sellers drive new revenue and improve service with advanced segmentation analytics
Blue Cross and Blue Shield of Kansas
Cuts mainframe costs with IBM
A leading credit services provider in Asia
Reduces risk and increases profitability with an advanced access management solution
Webcast: Identity & Access – for the Cloud & from the Cloud
Learn how IAM can help secure your applications in the cloud
IBM Security Identity and Access Management Buyer’s Guide
Assistance evaluating identity and access management solutions