Introducing IBM Security Access Manager for Mobile

Discover how ISAM for Mobile helps you secure mobile user access and manage mobile app security


The highly scalable and configurable IBM Security Access Manager for Mobile delivers mobile access security protection in a modular virtual or physical hardware appliance package, enabling you to quickly and securely manage both mobile user access and applications while helping you safeguard mobile, cloud, and social interactions across the enterprise.

In this demonstration, you'll see how ISAM for Mobile helps you:

  • Initiate mobile single sign-on and sessions management to provide secure access to mobile and web applications.
  • Enable context-aware authorization using device fingerprinting, geolocation awareness, and IP reputation mechanisms.
  • Provide integrated identity assurance authentication schemes such as one-time password (OTP; a password that is valid for only one login session or transaction) and RSA SecurID token support (a mechanism for performing two-factor authentication for a user to a network resource).
  • Deliver compliance and security intelligence—the combination of advanced analytics, expert analysis, and swift remediation—through tight integration with IBM Security QRadar products.

ISAM for Mobile also integrates well with IBM Worklight, an advanced development platform for designing, developing, and deploying native, web, and hybrid mobile applications.

The demonstration highlights several scenarios you're likely to encounter while delivering mobile security access services:

  • Risk-based access. Watch and learn how the software compares current device fingerprints against previously registered user fingerprints.
  • Simulated mobile phone application. Examine how to create and implement an enforced policy that allows a transaction for less than US$100 to automatically go through, requests more authentication if the transaction is more than US$100, and denies the transaction if it is greater than US$1000.
  • Building policy rules. See how to define and create unconditional and conditional rules for access policy. (Unconditional rules have three options: Allow, deny, request more information. Conditional rules let you define more parameters before the access decision is made, including such parameters as geolocation, IP reputation exclusion, and so on.)

Downloadable resources

Related topic


Sign in or register to add and subscribe to comments.

Zone=Security, Mobile development
ArticleTitle=Introducing IBM Security Access Manager for Mobile