Identity and access management

 

Threat-aware identity and access management securely extends user access across the enterprise

Our Security solutions for Identity and Access Management help organizations protect identity as a new security perimeter with controls to manage, enforce, and monitor user entitlements and access activities. Whether you are looking to securely adopt new business models such as cloud, mobile and social interactions, or tackling insider threats across the enterprise, IBM Security Identity and Access Management solutions help organizations protect online resources from unauthorized access and comply with security regulations.

  • IDC Product Flash

    IDC Product Flash: IBM Releases IAM for Mobile, Cloud, and Enterprise

    IDC reviews IBM IAM solutions for "enabling identity as the new security perimeter.”

  • Stay ahead of insider threats with predictive, intelligent security

    Stay ahead of insider threats with predictive, intelligent security

    Identify and protect against internal threats

Our identity and access management solutions focus on key security initiatives that IT and Line of Business managers are tasked with today:

See more identity and access management downloads.

What We Offer

See more identity and access management products.

 

Secure identity as a new perimeter with IBM Identity and Access Management solutions

View full image
View full image

We provide Threat-aware Identity and Access Management solutions to help clients manage and secure identities as a key line of defense across multiple perimeters, providing secure online access in today’s mobile, cloud, and social environments.

Identity and Access Management solutions are used to improve identity assurance, meet compliance needs, and reduce operational costs by providing insight and enforcement of user access to data, applications and infrastructure across the interconnected enterprise.

Safeguard mobile, cloud and social interactions

Prevent insider threat and identity fraud

Simplify identity silos and directory integrations

Deliver intelligent Identity and Access Assurance

Demos and Videos

  • Providing mainframe security administration, policy enforcement and reporting

  • Republic Services Counts on Enterprise Security Solutions from IBM

Analyst reports

  • Identity and Access Management

    Gartner Predicts 2014: Identity and Access Management

    Read Gartner’s review of the nexus of forces influencing complex shifts in identity and access management

  • Web Access Management

    Gartner MarketScope Report for Web Access Management

    Discover which web access management features your peers are looking to get at a lower cost and more.

  • IDC Product Flash

    IDC Product Flash: IBM Releases Threat-Aware and Identity Life-Cycle Management for Mobile, Cloud, and Enterprise

    IDC looks at the recent IBM announcement of threat-aware identity and access management with a focus on "enabling identity as the new security perimeter.”

  • Tolly Test Report

    Evaluating application protection, performance, and ease of use.

  • Identity and Access Intelligence: transforming enterprise security

    Protect critical IT assets, improve compliance, and address potential threats

  • Secure the enterprise with confidence

    Examining the security infrastructure landscape to detect threats and protect the reputation of an enterprise

White Papers

  • IBM

    Manage identities & access for continuous compliance and reduced risk

    Deploy and manage critical identity and access management controls within cloud environments

  • IBM

    Increase productivity and security with efficient identity and access management

    Protect data and resources while ensuring compliance with government regulations

  • .

    When millions need access

    Identity management in an interconnected world

  • IBM

    Stay ahead of insider threats with predictive, intelligent security

    Identify and protect against internal threats

  • IBM

    Intelligent role management for improved security and compliance

    Take control of user access entitlements

  • IBM

    Get actionable insight with security intelligence for mainframe environments

    Protect against threats affecting mainframe and distributed systems

  • IBM

    Protect the Mobile Enterprise with Smarter Security

    Prevent fraud and improve the user experience

References and Case Studies

  • IBM

    ADP

    Strengthens security with identity management initiative

  • IBM

    Flemish Government

    Providing seamless access for citizens

  • IBM

    Generali Deutschland Group

    Sellers drive new revenue and improve service with advanced segmentation analytics

  • IBM

    Blue Cross and Blue Shield of Kansas

    Cuts mainframe costs with IBM

Webcast

  • Next Generation Access and Identity Management for a multi-perimeter world

    Traditional perimeters are being extended

Buyers Guide

  • IBM

    IBM Security Identity and Access Management Buyer’s Guide

    Assistance evaluating identity and access management solutions

 

Not in United States?

Contact IBM

Considering a purchase?

IBM Security home

IBM offers a full range of solutions to protect your data and applications.

Explore IBM security solutions

Managing Secure Identity and Access in a Multi-connected world

Managing Secure Identity and Access in a Multi-connected world (00:01:26)

IBM X-Force Threat Intelligence Quarterly - 1Q 2014

Learn about emerging security threats and trends

Download now

Same product, new name!

The product you selected is now offered under a new name. The product page you will be taken to will reflect this new name.