Learn about Security Access Manager for Mobile

Watch three advanced authorization scenarios in action

This demonstration video shows three advanced authorization scenarios using IBM Security Access Manager for Mobile and WorkLight®.

Share:

Security developerWorks, Editor, IBM

Security developerWorks



08 April 2014

Protecting The Mobile Enterprise

Protecting the mobile enterprise

IBM has published a new white paper that explores how to provide secure access for mobile users, block unauthorized users, and prevent fraud with IBM Security Access Manager for Mobile. Download "Beyond passwords: Protect the mobile enterprise with smarter security."

Watch the demonstration video

IBM Security Access Manager for Mobile is available as an appliance in either a hardware or virtual form factor. Security Access Manager for Mobile provides single sign-on support for mobile applications, context aware authorization based on device fingerprinting, geolocation awareness, and IP address reputation. Security Access Manager for Mobile has built-in integration with WorkLight so you can specify policies based on conditions in the application, such as transaction amount. Security Access Manager for Mobile also provides a built-in mobile authentication service and one-time password support.

This demonstration video shows three scenarios:

  • First, you see a demo of Security Access Manager for Mobile's device fingerprinting capability in action, and then you see the attributes that Security Access Manager for Mobile collected in the background.
  • Second, the WorkLight integration is demonstrated with a policy that uses low-risk authentication for small transaction amounts, strong one-time password authentication for higher value transactions, and transactions above a certain amount are denied from mobile devices.
  • In the third location, authorization decisions are based on the location of the mobile device.

IBM Security Access Manager for Mobile

Resources

More downloads

Comments

developerWorks: Sign in

Required fields are indicated with an asterisk (*).


Need an IBM ID?
Forgot your IBM ID?


Forgot your password?
Change your password

By clicking Submit, you agree to the developerWorks terms of use.

 


The first time you sign into developerWorks, a profile is created for you. Information in your profile (your name, country/region, and company name) is displayed to the public and will accompany any content you post, unless you opt to hide your company name. You may update your IBM account at any time.

All information submitted is secure.

Choose your display name



The first time you sign in to developerWorks, a profile is created for you, so you need to choose a display name. Your display name accompanies the content you post on developerWorks.

Please choose a display name between 3-31 characters. Your display name must be unique in the developerWorks community and should not be your email address for privacy reasons.

Required fields are indicated with an asterisk (*).

(Must be between 3 – 31 characters.)

By clicking Submit, you agree to the developerWorks terms of use.

 


All information submitted is secure.

Dig deeper into Security on developerWorks


static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Security, Mobile development
ArticleID=967541
ArticleTitle=Learn about Security Access Manager for Mobile
publish-date=04082014