
Blogs
Blogs
Matching:
people
X

Display: |
Pontis Research IAMAWARE completes validation with IBM Security IAM Community Blog
Iamaware is an application, patent pending, focused on giving managers a single pane allowing them to view the status of an IAM framework from end to end. This helps with troubleshooting, spotting bottlenecks before they become an issue, number of requests,...
from Blog: Ready for IBM Security Intelligence - News
|
|
8K Miles: Don't Just Migrate - Embrace Cloud Securely Community Blog
Companies are moving workloads to the Cloud for operational and financial efficiencies. In this video, Lena Kannappan, COO from 8K Miles discusses how 8K Miles helps customers securely move to the Cloud. Integrating with IBM’s Federated Identity Manager,...
from Blog: Ready for IBM Security Intelligence - News
|
|
Gemalto: Multi-factor Authentication and Data Security for IBM Solutions Community Blog
The acquisition of SafeNet by Gemalto unites multitudes of integrations with IBM solutions. In this video Sean Price, Vice President for Business development at Gemalto discusses solutions for strong authentication and access management, and securing data as...
from Blog: Ready for IBM Security Intelligence - News
|
|
ObserveIT: User Activity Monitoring for IBM Security Solutions Community Blog
To meet compliance requirements, security teams need to understand the risks associated with users and IT administrators who have access to critical applications. In this video, Marc Potter, VP of Sales and Alliances from ObserveIT discusses how organizations...
from Blog: Ready for IBM Security Intelligence - News
|
|
BIO-key Multi-factor Authentication with IBM Security Access Manager Community Blog
Matching the level of identity assurance, to the value of the resource being accessed, is of paramount importance in lowering business risk. Increasing the level of identity assurance requires the use of an authentication mechanism, stronger than username and...
from Blog: Ready for IBM Security Intelligence - News
|
|
Blue Bay Technologies Strengthening Clients Security Posture with IBM Security Solutions Community Blog
Blue Bay Technologies uses IBM solutions to strengthen the security of many different types of organizations. Watch this video and hear Tony Weinzetl, CEO of Blue Bay Technologies, describe how solutions incorporating IBM products for Identity and Access...
from Blog: Ready for IBM Security Intelligence - News
|
|
Chapman University and Pontis Research: Identity Management in Higher Education Community Blog
Working with IBM Security premier business partner Pontis Research, Chapman University has implemented an integrated, holistic identity management solution for their students, faculty and staff. Using IBM Security Identity Manager, the university was able to...
from Blog: Ready for IBM Security Intelligence - News
Modified on by RussWarren
|
|
OnWire's OnCloud: IBM Identity and Access Management in a FedRAMP Ready Cloud Community Blog
CEO Chonly Wang explains how OnWire, an IBM Security Business Partner, helps organizations respond to the disruptive innovation of Cloud and mobile and the complexity it brings to security. OnWire provides preconfigured and flexible security services based on...
from Blog: Ready for IBM Security Intelligence - News
|
|
Prolifics: Insights on Identity Governance Community Blog
Clients around the globe are facing increased Identity Governance challenges within their organizations. In this video, Scott Auble, VP of the Security Practice at Prolifics, discusses some of those challenges and how Prolifics (and IBM) help to provide value...
from Blog: Ready for IBM Security Intelligence - News
|
|
Entersekt Transakt completed validation with IBM Security Access Manager Community Blog
Entersekt Transakt allows full PKI-based strong authentication directly from your mobile phone. Our technology revolutionizes online and mobile banking security by transparently enabling multi-factor authentication across channels while eliminating One Time...
from Blog: Ready for IBM Security Intelligence - News
Modified on by RussWarren
|
|
SafeNet Authentication Service completes validation with ISAM for Mobile 8.0 Community Blog
SafeNet Authentication Service completes validation with ISAM for Mobile 8.0 SafeNet Authentication Solutions integrate with IBM® Security Access Manager for Mobile to provide strong authentication for secure remote access to networks, mobile applications,...
from Blog: Ready for IBM Security Intelligence - News
|
|
Video from Prolifics on identity governance and IBM Security Identity Governance Community Blog
Clients around the globe are facing increased Identity Governance challenges within their organizations. In this video, Scott Auble, VP of the Security Practice at Prolifics, discusses some of those challenges and how Prolifics (and IBM) help to provide value...
from Blog: Ready for IBM Security Intelligence - News
Modified on by RussWarren
|
|
WWPass External Authentication Solution Validated with IBM Security Access Manager 8.0 Community Blog
WWPass External Authentication Solution Validated with IBM Security Access Manager 8.0 WWPass External Authentication Solution (EAS) provides strong hardware authentication and at the same time removes username/password pairs completely. WWPass EAS is a...
from Blog: Ready for IBM Security Intelligence - News
|
|
Case Study Published: IBM Security Access Manager for Enterprise Single Sign-On and IBM Partner BIO-key Community Blog
A credit services provider in Malaysia saves USD110,000 in password reset costs and lowers payroll expenses by 12 percent when it works with IBM Business Partner BIO-Key and installs IBM Security Access Manager for Enterprise Single Sign-On software, providing...
from Blog: Ready for IBM Security Intelligence - News
Modified on by RussWarren
|
|
Pirean Redguide Launched: “Enabling B2C Solutions with Identity and Access Management” produced in partnership with IBM. Community Blog
This guide describes solutions from IBM and Pirean that enable organizations to realise the new and significant routes to value from IAM, with examples of real-world Business-to-Consumer (B2C) scenarios, where these solutions are deployed to meet strategic...
from Blog: Ready for IBM Security Intelligence - News
Modified on by RussWarren
|
|
BIO-key - IBM Access Manager for Enterprise Single Sign-On Case Study : A Leading Credit Services Provider in Asia Community Blog
This leading credit services provider in Asia offers customer support to more than one million credit card holders around the world through more than 40 regional branch and service centers. Link to Case Study
from Blog: Ready for IBM Security Intelligence - News
Modified on by RussWarren
|
|
BIO-key - IBM Access Manager for Enterprise Single Sign-On Case Study : A Leading Credit Services Provider in Asia Community Blog
This leading credit services provider in Asia offers customer support to more than one million credit card holders around the world through more than 40 regional branch and service centers. Link to Case Study
from Blog: Ready for IBM Security Intelligence - News
Modified on by RussWarren
|
|
FuGen Solutions 8KMiles MISP Validated with IBM Security Federated Identity Manager Community Blog
8KMiles MISP (Multi-domain Identity Service platform) 2.0 has been validated with IBM Security Federation Manager. On average its costing IT between $25k and $40k to configure, debug, and manage a federation partnership with a SaaS or business partner...
from Blog: Ready for IBM Security Intelligence - News
Modified on by mpdugg
|
|
Whitepaper: Integrating ISAM4Web and Yubikey for Strong Authentication Community Blog
mpdugg
Tags:
yubikey
yubico
securityintelligence
people
isam
rfisi
security_intelligence
7,751 Views
This white paper describes how to use the Yubico hard token One-Time Password (OTP) generator as a replacement for traditional username & password authentication. A working example of an External Authentication Interface using a cloud-based...
from Blog: Ready for IBM Security Intelligence - News
Modified on by mpdugg
|
|
Strategies and Tips to Secure Mobile Devices Community Blog
Strategies and Tips to Secure Mobile Devices Securing mobile devices needs to provide flexibility and ease of use to enable users to login to the network and access the applications they need. IBM’s Security Access Manager® and Aruba ClearPass...
from Blog: Ready for IBM Security Intelligence - News
Modified on by RussWarren
|
|
RFISI Partner STEALTHbits Video On Unstructured Data Community Blog |
|
Akros Techlabs completes validation with ISAM Community Blog
CNBSignIn is a revolutionary User Authentication solution delivered over mobile application/SMS/Emails - to securely authenticate user access to confidential data sources such as, Corporate IT/Cloud Computing environments, SaaS applications, Online Bank/Stock...
from Blog: Ready for IBM Security Intelligence - News
|
|
CrossIdeas has created a new community Community Blog
Cross Ideas provides Identity & Access Governance Solutions to harmoniously manage people, applications and entitlements. The result is a stronger Risk Aware Enterprise, increased protection of customer investment in Identity Management and...
from Blog: Ready for IBM Security Intelligence - News
Modified on by RussWarren
|
|
Aruba Networks Completes Validation of ClearPass with IBM Security Access Manager for Web/Mobile Community Blog
The Ready for IBM Security Intelligence validation program is excited to announce the validation of Aruba Networks ClearPass with IBM Security Access Manager for Mobile (ISAM for Mobile). This joint solution bridges the gap between Network Access Control...
from Blog: Ready for IBM Security Intelligence - News
Modified on by RussWarren
|
|
Authenware Behavior Biometrics Tap Technology validated with IBM Security Access Manager Community Blog
Transparent Biometric 4FA. Strong, low cost, user friendly, cloud based Mobile and Desktop Authentication. Type in credentials as usual - or Tap a tune. Extremely effective Authentication and Fraud prevention without disrupting users. Based on Behavioral...
from Blog: Ready for IBM Security Intelligence - News
|