Feature spotlights

Go mobile with IBM Verify

IBM Security Access Manager introduces IBM Verify, its new mobile multi-factor authentication capability. Watch this video to learn more!

Establish identity federation

Complex access management systems create complex authentication processes and identity federation helps address this complexity. Learn how federation is possible with IBM Security Access Manager.

Strike a balance between security and usability

The IBM Security Access Manager's identity federation module helps you securely integrate third party SaaS applications into your existing infrastructure while providing your users with a smooth single sign-on experience on desktop and mobile.

Fight unauthorized access

Adopt risk-based access controls with IBM Security Access Manager's risk-scoring engine. This feature enforces context-aware authorization using information about your users, their mobile devices and other session-based information, without interfering with the end-user's session.

Securely adopt mobile

Have a strong control of your critical assets even on mobile. ISAM establishes strong mobile multi-factor authentication that helps you allow, challenge or deny mobile requests based on risk factors like application data, geographic location and IP reputation.

Ensure strong authentication

Ensure strong authentication that goes beyond the username and password. Allow for multi-factor authentication or challenge a risky access request with a one time password, email verification or knowledge-based question.

Sign-in to Office365 without a Password

With IBM Verify, you can allow your business users to log in to their work applications like Office 365 using fingerprint verification instead of a password.

Customer case studies

  • Providing SSO to multiple services

    POST Luxembourg
  • Ensuring strong authentication & transaction signing capabilities

    Entersekt

How customers use it

  • Password-less login for faster access to applications

    Problem

    Remembering multiple usernames and passwords

    Solution

    Allow your business users to log in to their work applications like Office 365 using fingerprint verification instead of a password.

  • Secure and user-friendly authentication experience

    Problem

    Creating seamless sign-on experiences for customers

    Solution

    Enable password-free authentication to your customer-facing apps and services.

  • Establishing risk-based access

    Problem

    Rogue users accessing my network

    Solution

    Adopt risk-based access controls with ISAM's risk-scoring engine feature. It enforces context-aware authorization about your users, their mobile devices and other session-based information, without interfering with the end-user's session.

  • Creating a secure digital channel for mobile devices

    Problem

    Expanding strong security to mobile

    Solution

    ISAM establishes strong mobile multi-factor authentication that helps you allow, challenge or deny mobile requests based on risk factors like application data, geographic location and IP reputation.

  • Reducing password fatigue with single sign-on

    Problem

    Complex access management systems

    Solution

    ISAM's identity federation helps address complex authentication processes. Securely integrate third party applications into your existing infrastructure while providing your users with a smooth single sign-on experience on desktop and mobile.

See how it works