Identity and access management

 

Threat-aware identity and access management for the open enterprise

Effective identity and access management requires tools to govern and enforce user access across multiple channels, including mobile, social and cloud.

IBM Security’s approach to identity and access management combines industry-leading software, services and appliances with security analytics and identity governance tools. These solutions help detect anomalies, prevent fraud, and protect user access in today's multi-perimeter environments.

The IBM Security threat-aware identity and access management portfolio helps you protect identity as a new perimeter with controls to manage and report on user entitlements and access activities. Armed with user metrics and audit reports, you can deal more quickly and efficiently with the complexities of compliance and inappropriate user access.

  • IBM Security Identity and Access Management Buyer’s Guide

    IBM Security Identity and Access Management Buyer’s Guide

    Assistance evaluating identity and access management solutions

  • .

    IBM Security Access Manager named 2014 winner in mobile IAM security

    Learn why Frost & Sullivan named IBM Security Access Manager for Mobile “best in class” for mobile identity and access management.

The IBM Security identity and access management portfolio helps you protect identity as a new perimeter with controls to manage and report on user entitlements and access activities.

Identity and access management software from IBM helps you:

What We Offer

See more identity and access management products.

 

Threat-aware identity and access management for the open enterprise

Today's identity and access management software needs to do more than just provision/de-provision employees and enforce appropriate role-based access to corporate resources. It also needs to consistently monitor access by different user groups, from employees to partners to consumers, and protect sensitive information wherever it resides.

IBM identity and access management software and appliances are integrated to help you quickly implement robust identity and access controls and improve security and support compliance initiatives. They are scalable and deliver high performance for even the largest implementations. At the same time, they can defend perimeters against increasingly sophisticated cybercriminals and malicious insiders by auditing and reporting on suspicious anomalies or non-compliant behavior.

IBM Security identity and access management software helps you connect users to information simply and securely, meet compliance needs and reduce operational costs. It addresses the following four imperatives:

Safeguard mobile, cloud and social access

Prevent advanced insider threats

Simplify cloud integrations and identity silos

Deliver actionable identity intelligence

Demos and Videos

  • Implementing Identity and Access Management at British American Tobacco

    Implementing Identity and Access Management at British American Tobacco

  • Prevent Insider Threats with IBM Security Privileged Identity Manager

    Prevent Insider Threats with IBM Security Privileged Identity Manager

Analyst reports

  • Identity and Access Management

    Gartner Predicts 2014: Identity and Access Management

    Read Gartner’s review of the nexus of forces influencing complex shifts in identity and access management

  • Web Access Management

    Gartner MarketScope Report for Web Access Management

    Discover which web access management features your peers are looking to get at a lower cost and more.

  • IDC Product Flash

    IDC Product Flash: IBM Releases Threat-Aware and Identity Life-Cycle Management for Mobile, Cloud, and Enterprise

    IDC looks at the recent IBM announcement of threat-aware identity and access management with a focus on "enabling identity as the new security perimeter.”

  • IBM Receives Frost & Sullivan Award for its Mobile IAM Solutions

    IBM Receives Frost & Sullivan Award for its Mobile IAM Solutions

    Analyst firm Frost & Sullivan ranks IBM "best in class" for mobile access security.

  • Identity and Access Intelligence: transforming enterprise security

    Identity and Access Intelligence: transforming enterprise security

    Protect critical IT assets, improve compliance, and address potential threats

  • Secure the enterprise with confidence

    Secure the enterprise with confidence

    Examining the security infrastructure landscape to detect threats and protect the reputation of an enterprise

White Papers

  • Avoiding Insider Threats to Enterprise Security

    Avoiding Insider Threats to Enterprise Security

    Learn how to enhance security by controlling privileged identities.

  • Manage identities & access for continuous compliance and reduced risk

    Manage identities & access for continuous compliance and reduced risk

    Deploy and manage critical identity and access management controls within cloud environments

  • When millions need access

    When millions need access

    Identity management in an interconnected world

  • Get actionable insight with security intelligence for mainframe environments

    Get actionable insight with security intelligence for mainframe environments

    Protect against threats affecting mainframe and distributed systems

  • Manage identities & access for continuous compliance and reduced risk

    Protect the Mobile Enterprise with Smarter Security

    Prevent fraud and improve the user experience

References and Case Studies

  • ADP

    ADP

    Strengthens security with identity management initiative

  • Flemish Government

    Flemish Government

    Providing seamless access for citizens

  • Generali Deutschland Group

    Generali Deutschland Group

    Sellers drive new revenue and improve service with advanced segmentation analytics

  • Blue Cross and Blue Shield of Kansas

    Blue Cross and Blue Shield of Kansas

    Cuts mainframe costs with IBM

Webcast

  • Go Mobile But Be Safe - User Access Security should top your BYOD agenda

    Learn why mobile access security is critical

Buyers Guide

  • IBM Security Identity and Access Management Buyer’s Guide

    IBM Security Identity and Access Management Buyer’s Guide

    Assistance evaluating identity and access management solutions

 

Not in United States?

Contact IBM

Considering a purchase?

Threat Aware Identity and Access Management for the Open Enterprise

Threat Aware Identity and Access Management for the Open Enterprise (00:02:27)

IBM Acquires Lighthouse to Help Streamline IAM for Mobile, Social and Cloud

This cloud security services provider protects identity and data in an increasingly complex IT environment
Learn more


What leading analysts are saying about IBM’s acquisition of CrossIdeas

CrossIdeas’ solutions offer a business-centric focus on identity governance and analytics.
Learn more

Related links

Same product, new name!

The product you selected is now offered under a new name. The product page you will be taken to will reflect this new name.