Identity and access management

 

Threat-aware identity and access management for the open enterprise

Today's organizations need to govern and enforce user access across multiple channels, including mobile, social and cloud. At the same time, they must address business needs such as role management, compliance and audit reporting and integration of various user populations.

IBM® Security identity and access management solutions help strengthen compliance and reduce risk by protecting and monitoring user access in today's multi-perimeter environments.

  • Ebook

    White Paper

    Learn how identity governance became key to compliance and risk control.

  • White paper

    IAM Buyers Guide

    Get assistance evaluating identity and access management solutions

IBM Security identity and access solutions help safeguard valuable data and applications with context-based access control, security policy enforcement and business-driven identity governance. Armed with user metrics and audit reports on user entitlements and access activities, you can deal more quickly and efficiently with the complexities of user access management, insider threats and compliance requirements.

Identity and access management solutions from IBM help:

Featured offers

With IBM Security identity and access management products, you can connect users to information simply and securely, meet compliance needs and protect critical assets across the open enterprise

These products include:


  • IBM Security Directory Integrator

    IBM Security Directory Integrator

    Helps you build an authoritative data infrastructure by integrating data from directories, databases, collaborative systems, applications and other data sources.

  • IBM Security Identity Manager

    IBM Security Identity Manager

    Enables organizations to drive effective identity management and governance across the enterprise.

  • IBM Security zSecure Admin

    IBM Security zSecure Admin

    Automates and simplifies IBM Resource Access Control Facility (RACF®) security and compliance administration for mainframe environments.

Demos and Videos

  • Defend Your Multi-Perimeter Organization with Threat-Aware IAM

    Defend Your Multi-Perimeter Organization with Threat-Aware IAM

  • Strengthen identity assurance with IBM Security Identity Manager

    Strengthen identity assurance with IBM Security Identity Manager

  • Chapman University and Pontis Research: Identity Management in Higher Education

    Chapman University and Pontis Research: Identity Management in Higher Education

Analyst reports

  • Gartner 2015 Magic Quadrant for IGA

    See why Gartner selects IBM as a leader.

  • Secure the enterprise with confidence

    Secure the enterprise with confidence

    Examining the security infrastructure landscape to detect threats and protect the reputation of an enterprise

  • Identity and Access Intelligence: transforming enterprise security

    Identity and Access Intelligence: transforming enterprise security

    Protect critical IT assets, improve compliance, and address potential threats

  • IBM Receives Frost & Sullivan Award for its Mobile IAM Solutions

    IBM Receives Frost & Sullivan Award for its Mobile IAM Solutions

    Analyst firm Frost & Sullivan ranks IBM "best in class" for mobile access security.

  • KuppingerCole 2014 Cloud IAM/IAG Leadership Compass report

    KuppingerCole 2014 Cloud IAM/IAG Leadership Compass report

    See why KuppingerCole considers IBM an overall Leader in cloud identity and access management/governance security.

White Papers

  • How Identity Governance Became a Key Security Control

    How Identity Governance Became a Key Security Control

    Improve security and risk posture with an integrated governance solution

  • IBM

    See clearly in the cloud with threat-aware identity and access management

    Learn how to securely connect people, applications and devices to cloud environments

  • IBM

    Manage identities & access for continuous compliance and reduced risk

    Deploy and manage critical identity and access management controls within cloud environments

  • IBM

    Mitigating risks with security intelligence and identity assurance

    Help defend against insider threats, manage access and boost compliance

  • IBM

    Get actionable insight with security intelligence for mainframe environments

    Protect against threats affecting mainframe and distributed systems

  • Prevent advanced insider threats with IBM Security solutions

    Prevent advanced insider threats with IBM Security solutions

    Control and audit privileged accounts to prevent insider threat and identity fraud

References and Case Studies

  • IBM

    ADP

    Strengthens security with identity management initiative

  • IBM

    Flemish Government

    Providing seamless access for citizens

  • IBM

    Whirlpool Corporation

    Reduces the cost and complexity of identity management across SAP and enterprise applications

  • IBM

    Cochlear Limited

    Enterprise portal and web content management drives consistent online presence

  • IBM

    Generali Deutschland Group

    Sellers drive new revenue and improve service with advanced segmentation analytics

  • IBM

    Blue Cross and Blue Shield of Kansas

    Cuts mainframe costs with IBM

  • IBM

    A leading credit services provider in Asia

    Reduces risk and increases profitability with an advanced access management solution

Webcast

  • The Good, the Bad and the Ugly

    The Good, the Bad and the Ugly:

    A Different Perspective on Identity Governance - E.ON Global Commodities implements IBM identity governance solutions to bolster compliance and strengthen business controls.

Buyers Guide

  • IBM

    IBM Security Identity and Access Management Buyer’s Guide

    Assistance evaluating identity and access management solutions

Not in United States?

Contact IBM

Considering a purchase?

Frost & Sullivan Honors IBM for Leading the Global Identity and Access Management Market

Same product, new name!

The product you selected is now offered under a new name. The product page you will be taken to will reflect this new name.