Tag Archives: iam

Safeguarding mobile, cloud and social interactions across the enterprise

Guest post from IBM Security Systems

IBM is Gold Sponsor at Identity and Access Management, taking place in London on 22nd October. Enterprise IT professionals can claim a complimentary pass for the event, here.

IBM Security Logo

The line between work and personal technology continues to merge as smartphones, tablets and other mobile devices proliferate. Although mobile employees can be more productive by working anytime and anywhere, doing so means they are accessing resources from outside the traditional network perimeter.  Traditional access and authentication controls are now no longer sufficient to safeguard the organisation. As cyber criminals become more sophisticated in their attack methods, so organisations need to be more diligent and proactive in protecting resources in a mobile environment. IBM has developed a portfolio of mobile security solutions that emphasize an adaptive approach to security that can help drive down costs, is secure and can keep up with today’s business climate.

The latest addition to the portfolio is IBM Security Access Manager for Mobile (ISAM for Mobile)

ISAM for Mobile protects access to enterprise resources by authenticating and authorizing mobile users and their devices. Available as either a virtual or hardware based appliance, ISAM for Mobile enables organisations to safeguard access points into the corporate network and enforce context-based access policies that define who and what can access protected resources. Highly scalable and configurable, the solution is designed to deliver a quick time to value and a lower total cost of ownership (TCO).

ISAM for Mobile provides a variety of capabilities for strengthening mobile security:

  • Enables secure user access to mobile and web applications with single sign-on, session management and context-based access control.
  • Improves identity assurance with flexible authentication schemes, such as one-time passwords and RSA SecurID token support ensure single sign-on is available from all access points in the network.
  • Enforces context-aware authorization using device fingerprinting, geographic location awareness and IP reputation scores.
  • Delivers seamless user and application security through integrations with IBM® Worklight
  • Provides actionable insights for reducing risks and demonstrating compliance through integration with the IBM® QRadar® Security Intelligence Platform

For more information on ISAM for Mobile visit our web site at http://www-03.ibm.com/software/products/us/en/access-mgr-mobile

To learn more about protecting the organisation in a multi-perimeter world, come and hear Ravi Srinivasan, Director, Strategy and Product Management, IBM Security Systems, present on Threat-aware Identity and Access Management during the keynote at Ovum Identity & Access Management on 22nd October.

Cloud: transforming the IAM industry

Andrew Kellett, Principal Analyst – Software and IT Solutions, has been sharing his thoughts on the problems and opportunities that Cloud presents to the identity and access management industry. Andrew will be presenting his latest research on the topic at Ovum’s 2nd Annual Identity and Access Management Forum, taking place in London in October. Read more below, and on the Ovum website:

The cloud provides significant problems and opportunities for the identity and access management (IAM) industry, according to global analyst firm Ovum. It is a disruptive technology that is challenging the status quo within the IAM sector.

New research from the global analyst firm examined the impact of cloud computing and identity-as-a-service (IaaS) on the IAM sector. Traditional platform vendors are coming under pressure from a new generation of cloud-based specialists that are changing the way that IAM services will be consumed in the future.

According to Andrew Kellett, principal analyst for IT security solutions and author of the report, “The increasing use of cloud-based services is driving the need for better and more interactive single sign-on (SSO) and federated identity management (FIM) facilities. For the foreseeable future, organisations will continue to make use of a mixed range of on-premise, hosted and cloud-based systems and services.”

Continue reading