Introducing IBM Security Access Manager for Mobile

Discover how ISAM for Mobile helps you secure mobile user access and manage mobile app security

IBM Security Access Manager for Mobile can deliver mobile access security protection in a modular virtual or physical appliance package, enabling you to securely manage both mobile user access and applications. In this demonstration, you'll see how ISAM for Mobile helps you initiate mobile single sign-on and sessions management; enable context-aware authorization using device fingerprinting, geolocation awareness, and IP reputation mechanisms; and more.

Share:

developerWorks security editors, Staff, IBM

Security icon imageThis article is brought to you by the editors of the developerWorks Security site.



06 January 2014

Also available in Russian

Demo: Introducing Security Access Manager for Mobile

Video: IBM Security Access Manager for Mobile allows organizations to grant access to mobile and web applications utilizing context-based authorization, 8:19

The highly scalable and configurable IBM Security Access Manager for Mobile delivers mobile access security protection in a modular virtual or physical hardware appliance package, enabling you to quickly and securely manage both mobile user access and applications while helping you safeguard mobile, cloud, and social interactions across the enterprise.

In this demonstration, you'll see how ISAM for Mobile helps you:

  • Initiate mobile single sign-on and sessions management to provide secure access to mobile and web applications.
  • Enable context-aware authorization using device fingerprinting, geolocation awareness, and IP reputation mechanisms.
  • Provide integrated identity assurance authentication schemes such as one-time password (OTP; a password that is valid for only one login session or transaction) and RSA SecurID token support (a mechanism for performing two-factor authentication for a user to a network resource).
  • Deliver compliance and security intelligence—the combination of advanced analytics, expert analysis, and swift remediation—through tight integration with IBM Security QRadar products.

Protecting The Mobile Enterprise

IBM has published a new white paper to explore how to provide secure access for mobile users, block unauthorized users, and prevent fraud with IBM Security Access Manager for Mobile. Download "Beyond passwords: Protect the mobile enterprise with smarter security."

ISAM for Mobile also integrates well with IBM Worklight, an advanced development platform for designing, developing, and deploying native, web, and hybrid mobile applications.

The demonstration highlights several scenarios you're likely to encounter while delivering mobile security access services:

  • Risk-based access. Watch and learn how the software compares current device fingerprints against previously registered user fingerprints.
  • Simulated mobile phone application. Examine how to create and implement an enforced policy that allows a transaction for less than US$100 to automatically go through, requests more authentication if the transaction is more than US$100, and denies the transaction if it is greater than US$1000.
  • Building policy rules. See how to define and create unconditional and conditional rules for access policy. (Unconditional rules have three options: Allow, deny, request more information. Conditional rules let you define more parameters before the access decision is made, including such parameters as geolocation, IP reputation exclusion, and so on.)

Resources

Learn

Get products and technologies

Discuss

  • Get involved in the developerWorks Community. Connect with other developerWorks users while exploring the developer-driven blogs, forums, groups, and wikis.

Comments

developerWorks: Sign in

Required fields are indicated with an asterisk (*).


Need an IBM ID?
Forgot your IBM ID?


Forgot your password?
Change your password

By clicking Submit, you agree to the developerWorks terms of use.

 


The first time you sign into developerWorks, a profile is created for you. Information in your profile (your name, country/region, and company name) is displayed to the public and will accompany any content you post, unless you opt to hide your company name. You may update your IBM account at any time.

All information submitted is secure.

Choose your display name



The first time you sign in to developerWorks, a profile is created for you, so you need to choose a display name. Your display name accompanies the content you post on developerWorks.

Please choose a display name between 3-31 characters. Your display name must be unique in the developerWorks community and should not be your email address for privacy reasons.

Required fields are indicated with an asterisk (*).

(Must be between 3 – 31 characters.)

By clicking Submit, you agree to the developerWorks terms of use.

 


All information submitted is secure.

Dig deeper into Security on developerWorks


static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Security, Mobile development
ArticleID=959428
ArticleTitle=Introducing IBM Security Access Manager for Mobile
publish-date=01062014