IBM Security Privileged Identity Manager: Automate ID management
Start learning how to effectively manage insider IT security threats
From the developerWorks archives
Date archived: December 19, 2016 | First published: July 23, 2013
This quick-read guide explains the basics of how IBM® Security Privileged Identity Manager centralizes the management of privileged and shared accounts and helps you track and audit the activities of privileged users so you can provide effective security and authentication governance.
This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.