Check out technical articles, developer guides and more in Verify’s new documentation hub

Check out technical articles, developer guides and more in Verify’s new documentation hub Read the docs

Features of IBM Security Verify for Workforce IAM

Log in with federated single sign-on (SSO)

Eliminate username and password hassles and secure access to all your applications with a single set of login credentials. Deliver one-click access to applications from a unified SSO launchpad using out-of-the-box common SaaS application connectors or templates for custom SAML 2.0 or OpenID Connect applications.

Enhance security with multi-factor authentication (MFA)

Protect accounts with an additional security layer and meet compliance requirements with a common approach to MFA across applications, VPN, Windows desktops and Linux. Infuse multiple modern forms of user authentication per resource beyond SMS/email one-time passwords, including passwordless authentication options like IBM Verify mobile app push notifications, user biometrics, QR codes, FIDO2 hard tokens and more.

Identify and mitigate access risks with identity analytics

Add risk awareness with a holistic view of identity lifecycle risk including decision support in the form of risk scores for users, applications, and entitlements, accompanied by recommended mitigation actions powered by machine learning.

Adapt for context using continuous access control

Allow streamlined access to low-risk users and either block or challenge access in higher-risk conditions with contextual, risk-based authentication and adaptive access. Organizations can use a simple policy editor to apply AI-informed access policies to prompt for MFA based on deep fraud detection signals across user, device, activity, environment and behavior context.

Enable user provisioning and lifecycle management

Enable automatic provisioning and deprovisioning for applications with SCIM and provide users with self-service options to request access to applications and reset and manage their own passwords. Connect to existing directories through SAML or identity agents for LDAP and Active Directory, and synchronize user directories with the cloud directory to consolidate a single source.

Automate recertification campaigns

Streamline joiner-mover-leaver provisioning processes, and implement a periodic recertification cadence for higher risk applications to meet compliance requirements.

Simplify complex user management

Leverage predefined user attribute functions for common adoption and migration needs, call out to third party tools and databases to enrich user profiles with custom attributes, and run multi-line rules and expressions for complex attribute use cases for user management.

Extend SSO to UEM with IBM Security MaaS360 integration

Deliver seamless SSO, and verify users and devices with compliance-based conditional access, for all apps and unified endpoint management (UEM)-enrolled devices.

Extend workflows with QRadar and Resilient integration

Infuse identity as a central pillar of any zero trust strategy by integrating with threat management and incident response out-of-the-box. Stream Verify event data to QRadar to identify and analyze threat anomalies, and send Verify anomalies and other events to Resilient to take action, such as automatically resetting a password or removing an entitlement.

Protect on-premises applications from the cloud

Bridge the gap in your IAM infrastructure and simplify your migration to a cloud-based identity provider with a lightweight application gateway that extends access control to on-premises web applications.

Troubleshoot events with custom activity reports

Investigate trends and troubleshoot suspicious events with user and application activity reports, from a global overview down to granular parameters from a single login. Audit all user activity for compliance purposes, view management changes and audit administrative activity, visualize MFA trends or application usage over time and more.

Empower managers to control access with delegation

Reduce time and skill dependencies on IT. Delegate the responsibility of application ownership to line of business managers, empowering them to provide their employees with faster access to applications.

Talk to an expert and learn how Verify for Workforce IAM can address your use case.

Talk to an expert and learn how Verify for Workforce IAM can address your use case. Schedule a Consult

How customers use it

  • Screen shot of corporate access policy managmenet

    Assess full user context with Adaptive Access

    Problem

    Balancing security with user experience, allowing frictionless access to low-risk users.

    Solution

    Take context into account by infusing risk-based authentication into access policy decisions. Protect against higher-risk conditions without burdening low-risk users.

  • Monitor identity lifecycle risk with Identity Analytics

    Problem

    Understanding key risk areas in an IAM environment and what to do about them.

    Solution

    Scan for top risks across users and applications and leverage recommended mitigation actions powered by machine learning.

  • Screen shot of productivity applications interface

    Automate access recertification campaigns

    Problem

    Auditing to ensure access levels remain appropriate over time adds effort and is difficult to keep up-to-date to meet compliance requirements.

    Solution

    Take an automated approach and set up as many periodic recertification campaigns as you need, at any cadence.

  • Simplify access requests

    Problem

    Onboarding employees can be difficult to secure access for all employees appropriately, and IT has too many application access requests to sort through.

    Solution

    An application catalog and access request interface that lets you provision access to applications faster.

  • Screen shot of user access reporting

    Investigate authentication events

    Problem

    Lack of insight into user trends, suspicious events, and authentication challenges.

    Solution

    Dive into user and application reports to identify authentication patterns and investigate suspicious events. Dig into specific users to investigate common issues like SSO activity, account lockouts, login failures, or credential resets.

You may also be interested in

IBM MaaS360 with Watson™

IBM MaaS360 Unified Endpoint Management with Watson

IBM Security Verify Privilege Vault

Password vaulting, auditing, and privileged access control for the enterprise, available both on-premises or in the cloud.

IBM Security Verify Governance

IBM Security Verify Governance allows organizations to provision, audit and report on user access and activity through lifecycle, compliance and analytics capabilities.

IBM Security Verify for Consumer IAM

Frictionless access, privacy and consent tracking, and progressive profiling for external users.