Threat-aware identity and access management for the open enterprise

Today's organizations need to govern and enforce user access across multiple channels, including mobile, social and cloud. At the same time, they must address business needs such as role management, compliance and audit reporting and integration of various user populations.

IBM® Security identity and access management solutions help strengthen compliance and reduce risk by protecting and monitoring user access in today's multi-perimeter environments.

  • Ebook

    White Paper

    Learn how identity governance became key to compliance and risk control.

  • White paper

    Tolly Test Report

    IBM Security Access Manager -Web Application Protection, Performance, Federation & Risk-Based Access Evaluation

IBM Security identity and access solutions help safeguard valuable data and applications with context-based access control, security policy enforcement and business-driven identity governance. Armed with user metrics and audit reports on user entitlements and access activities, you can deal more quickly and efficiently with the complexities of user access management, insider threats and compliance requirements.

Identity and access management solutions from IBM help:

Featured offers

With IBM Security identity and access management products, you can connect users to information simply and securely, meet compliance needs and protect critical assets across the open enterprise

These products include:


  • IBM Security Directory Suite

    IBM Security Directory Suite

    Helps you build a single, authoritative identity infrastructure by transforming and synchronizing identity data from heterogeneous sources.

  • IBM Security Identity Manager

    IBM Security Identity Manager

    Enables organizations to drive effective identity management and governance across the enterprise.

  • IBM Security zSecure Admin

    IBM Security zSecure Admin

    Automates and simplifies IBM Resource Access Control Facility (RACF®) security and compliance administration for mainframe environments.

Videos

  • Secure access in the era of mobile and cloud

    Secure access in the era of mobile and cloud

  • Whirlpool: Reducing the cost and complexity of identity management

    Whirlpool: Reducing the cost and complexity of identity management

  • E.ON Streamlines IT Audits with IBM Security Identity Governance

    E.ON Streamlines IT Audits with IBM Security Identity Governance

  • Westar Energy Protects the Power Grid with IBM Security

    Westar Energy Protects the Power Grid with IBM Security

  • Secure

    Secure your Organization with IBM Security Identity Governance & Intelligence

  • Entersekt

    Entersekt: Providing Strong Authentication & Transaction Signing Capabilities

Analyst reports

  • Gartner

    Gartner

    Identity Governance and Administration Magic Quadrant 2016

  • KuppingerCole

    KuppingerCole Leadership Compass

    Access Management & Federation

  • Tolly Test Report

    Tolly Test Report

    IBM Security Access Manager -Web Application Protection, Performance, Federation & Risk-Based Access Evaluation

White Papers

  • .

    Take back control of access management with an integrated platform for web, mobile & cloud


  • .

    For better access governance, look beyond roles to entitlements


  • .

    Key steps to securing data and maintaining proper access


  • .

    How Identity Governance became a key compliance and risk control


  • .

    Protect your critical assets with Identity Governance


References and Case Studies

  • IBM

    Whirlpool Corporation

    Reduces the cost and complexity of identity management across SAP and enterprise applications

  • IBM

    Cochlear Limited

    Enterprise portal and web content management drives consistent online presence

  • IBM

    Generali Deutschland Group

    Sellers drive new revenue and improve service with advanced segmentation analytics

  • IBM

    A leading credit services provider in Asia

    Reduces risk and increases profitability with an advanced access management solution

Webcasts

  • The Good, the Bad and the Ugly

    The Good, the Bad and the Ugly:

    A Different Perspective on Identity Governance - E.ON Global Commodities implements IBM identity governance solutions to bolster compliance and strengthen business controls.

  • The Good, the Bad and the Ugly

    Preventing Entitlements Creep with Identity Governance

  • The Good, the Bad and the Ugly

    Identity Governance: Not just for compliance

  • The Good, the Bad and the Ugly

    The cross-examination of identity governance and intelligence

  • The Good, the Bad and the Ugly

    Safeguard Healthcare Identities and Data with Identity Governance and Intelligence

  • The Good, the Bad and the Ugly

    MISTI webcast: How Identity Governance Can Help Protect Your Organization

  • The Good, the Bad and the Ugly

    Gartner webcast: Identity Governance and Access Management

  • The Good, the Bad and the Ugly

    KC: One IT, One Identity: Mastering the Security Challenge in the Age of Digital Transformation

  • The Good, the Bad and the Ugly

    451 Group - Get a grip! Webcast

  • The Good, the Bad and the Ugly

    Surviving the Mobile Phenomenon

Not in United States?

Contact IBM

Considering a purchase?

Frost & Sullivan Honors IBM for Leading the Global Identity and Access Management Market