IBM Security Server is now IBM Security Verify Privilege Vault!
Frequently asked questions
Get answers to the most commonly asked questions about this product.
FAQ
Getting started with this product
What is a least privilege policy?
How do you successfully comply with a least privilege policy?
Should least privilege policy include approved business apps and a process to keep users productive?
What is a trusted or allowed application?
Creating a trusted or allowed application is the practice of specifying an index of approved software applications that are permitted to be present and active on a computer system. The goal is to protect computers and networks from potentially harmful applications.
What is policy-based application control?
Proactively manage and monitor all the applications running on your endpoints with policy-driven controls such as trusted/allowed lists and elevation policies, real-time application analysis and admin approval workflows.