Feature spotlights

Securely adopt mobile

Have a strong control of your critical assets even on mobile. Verify Access establishes strong mobile multi-factor authentication that helps you allow, challenge, or deny mobile requests based on risk factors like application data, geographic location and IP reputation.

Establish identity federation

Have a strong control of your critical assets even on mobile. Verify Access establishes strong mobile multi-factor authentication that helps you allow, challenge, or deny mobile requests based on risk factors like application data, geographic location and IP reputation.

Ensure strong authentication

Ensure strong authentication that goes beyond the username and password. Enable multi-factor authentication or challenge a risky access request with a one time password, email verification or knowledge-based question.

Enable passwordless login to Office365

Allow your business users to log in to their work applications like Office 365 using fingerprint verification instead of a password.

Strike a balance between security and usability

Verify Access identity federation helps you securely integrate third party SaaS applications into your existing infrastructure while providing your users with a smooth single sign-on experience on desktop and mobile.

Enable risk-based authentication

Adopt risk-based access controls with the Verify Access risk-scoring engine. This feature enforces context-aware authorization using information about your users, their mobile devices and other session-based information, without interfering with the end-user's session.

How customers use it

  • Illustration of fingerprint verification with IBM Security Verify Access

    Password-less login for faster access to applications

    Problem

    Remembering multiple usernames and passwords.

    Solution

    Allow your business users to log in to their work applications like Office 365 using fingerprint verification instead of a password.

  • Illustration of IBM Security Verify Access enabling password-free authentication to customer-facing apps and services

    Secure and user-friendly authentication experience

    Problem

    Creating seamless sign-on experiences for customers.

    Solution

    Enable password-free authentication to your customer-facing apps and services.

  • Screen shot of the Verify Access risk-scoring engine

    Establishing risk-based access

    Problem

    Rogue users accessing my network.

    Solution

    Adopt risk-based access controls with the Verify Access risk-scoring engine. This feature enforces context-aware authorization using context about your users and other session-based information, with minimal interference.

  • Illustrating IBM Security Verify Access establishing strong mobile multifactor authentication

    Creating a secure digital channel for mobile devices

    Problem

    Expanding strong security to mobile.

    Solution

    Verify Access establishes strong mobile multifactor authentication that helps you allow, challenge or deny mobile requests based on risk factors like application data, geographic location and IP reputation.

  • Illustration of complex access management systems

    Reducing password fatigue with single sign-on

    Problem

    Complex access management systems.

    Solution

    Identity federation allows you to securely integrate third party applications into your existing infrastructure while providing your users with a smooth single sign-on experience on desktop and mobile.