How IBM Security Identity and Access Assurance works

Acts as the hub for authentication and authorization

IBM Security Access Manager acts as the hub for authentication and authorization for web and other applications. It centralizes access management and makes it easier and more cost effective to deploy secure applications. The solution provides user-centric, federated single sign-on to help you securely share information between trusted partners. This software uses open standards for service-oriented architecture (SOA) and web services deployments for distributed portal and mainframe environments.

Delivers enterprise-level identity management and governance

IBM Security Identity Governance and Intelligence provides functionality to cover enterprise user lifecycle management, including access risk assessment and mitigation using business-driven identity governance and end-to-end user lifecycle management. Security Identity Governance and Intelligence helps organizations mitigate access risks and access policy violations by using intelligence driven, business-driven identity governance integrated with end-to-end user lifecycle management.

Manages and audits the use of privileged access credentials

IBM Security Privileged Identity Manager protects, automates and audits the use of privileged identities to help thwart insider threats and improve security across the extended enterprise, including cloud environments.

Simplifies identity and directory management

IBM Security Directory Suite is a scalable, standards-based identity platform that simplifies identity and directory management. Security Directory Suite helps collapse identity silos into a single authoritative identity source. This unified identity enables faster and more agile application deployment and improved user experience. Security Directory Suite also captures user insight for auditing and compliance reporting.

Collects and aggregates data into actionable IT forensics

IBM Security QRadar Log Manager collects and aggregates data across a wide variety of network and security devices into actionable IT forensics. Organizations can easily analyze all logs, generate comprehensive reports and reduce risk by investigating and resolving security threats faster.