White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview
|
|
- Christine Stokes
- 5 years ago
- Views:
Transcription
1 White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview
2 Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4 Key features 5 Comprehensive coverage of enterprise end points 6 User-centric access tracking 6 Centralized push deployment with no change to the existing infrastructure 7 Web-based administration and integration with provisioning solutions 7 Choice of authentication factors 9 Customizable end-point IAM framework 10 Combined physicial-logical access 11 Enterprise single sign-on and access automation 11 Complete session management 12 Integrated self-help with loss management 13 Single sign-on across a variety of user groups 13 A unified strategy from IBM 14 For more information 15 About Tivoli software from IBM Executive summary With an increasing number of enterprise applications and access points, organizations face the challenge of providing convenient access while ensuring strong security. Enterprises need software to help ensure that the right users have access to the right information in a timely manner. IBM Tivoli Access Manager for Enterprise Single Sign-On is an identity and access management solution that provides: Visibility into user activities. Control over business processes and risks. Automation of logins, access and security workflows. This white paper describes Enterprise Single Sign-On, including its key features and benefits. The enterprise access challenge As the number of enterprise applications and access points increase, organizations must manage the trade-off of providing convenient access while at the same time ensuring strong security. Organizations are looking for a balance between easy access to information and strong, compliant security. A secure system raises identity assurance through strong authentication and provides integrated tracking of user access. It is not sufficient to know that users are who they say they are, but also which applications the users are attempting to access. Enterprises need identity and access management (IAM) software to help ensure that the right users have access to the right information in a timely manner.
3 Page 3 Enterprise Single Sign-On delivers a simple and flexible identity and access management solution, combining enterprise single signon with strong authentication. Seamless access to applications Enterprise Single Sign-On delivers a simple, flexible and complete identity and access management solution at the enterprise end points. It combines enterprise single sign-on with strong authentication, and audit and compliance services, while integrating seamlessly with provisioning and directory services, with no change to your existing infrastructure. Figure 1 provides an overview of the system architecture. Bob Bob ******** ******** Figure 1: Enterprise Single Sign-On combines single sign-on, strong authentication, session management, access workflow automation, and audit tracking, with no change to the existing infrastructure.
4 Page 4 The central components of Enterprise Single Sign-On are: Identity Wallet Authentication Factors AccessAgent and Plug-ins IMS Server AccessAgent implements single sign-on and end-point automation with extensible Plug-ins, while the IMS Server provides server-managed controls. Each user has an Identity Wallet, which enables roaming and consolidation of user identities. Key features Enterprise Single Sign-On provides the convenience of securely signing on once and immediately getting access to the information you need. Enterprise Single Sign-On also provides the following key features. Visibility into user activities Comprehensive coverage of enterprise end points helps ensure a consistent user experience and end-to-end tracking. User-centric access tracking provides a meta-log for compliance reporting. Control over business processes and risks Centralized push deployment with no change to the existing infrastructure provides easy deployment and helps reduce risk. Web-based administration and integration with provisioning solutions provides centralized identity and access management. Choice of authentication factors helps reduce the risk of identity fraud. Customizable end-point identity and access automation enables end-point control without changing the existing IT infrastructure.
5 Page 5 Automation of access and security workflows Leverage a single badge for both physical and logical access. Enterprise single sign-on and access automation help improve user convenience and productivity. Complete session management helps ensure that user workflows are supported by the right session capabilities. Integrated self-help with loss management enables user self-service. Enterprise Single Sign-On provides comprehensive coverage of enterprise end points such as personal and shared workstations, virtualized remote access terminals, Web portals, and extranets. Comprehensive coverage of enterprise end points Enterprise Single Sign-On provides comprehensive coverage of enterprise end points such as personal and shared workstations, virtualized remote access terminals (Citrix and Microsoft Windows Terminal Services), Web portals, and extranets. Users can access the corporate network across all end points more securely and easily. IT managers can centrally manage and synchronize security policies across end points and track access events for compliance reporting. In addition to support for applications running on Windows platforms, Enterprise Single Sign-On supports access to applications on Citrix MetaFrame servers. AccessAgent provides single sign-on and sign-off for applications through Citrix ICA Client or Citrix Web Interface. It can also enable two-factor authentication to applications on Citrix MetaFrame servers or Windows Terminal Services. Support for single sign-on to applications on portals and extranets is provided through Web Workplace. Users need just one password and no desktop software to remotely log in to applications. Access to Web Workplace
6 Page 6 can be secured using one-time password tokens or Mobile ActiveCode. Once access is granted, users can single sign on through their browser to all enterprise applications, including Web applications and legacy applications hosted on Terminal Services or Citrix servers. Enterprise Single Sign-On provides consolidated user-centric logs for more effective audit control. User-centric access tracking To facilitate regulatory compliance, enterprises need to know which applications users access, who they log in as, when users access applications, and from where they access them. This information has traditionally been aggregated in application-centric logs. These logs remain unconsolidated silos, and the lack of consolidated identities can make aggregation challenging. With Enterprise Single Sign-On, each AccessAgent transparently logs all user login activities and reports them to the IMS Server. The consolidated user-centric logs provide for effective audit control. In addition, information is organized in a relational database, facilitating reporting and real-time monitoring. Enterprise Single Sign-On can work with minimal or no change to an enterprise s existing IT infrastructure. Centralized push deployment with no change to the existing infrastructure Enterprise Single Sign-On will work with Microsoft Windows Active Directory group policy objects and all major software distribution solutions for remote installations. It may also be configured to support auto-registration so that users with Active Directory accounts are auto-registered. Enterprise Single Sign-On can work with minimal or no change to an enterprise s existing IT infrastructure. It will work with any directory structure and does not require directory consolidation or schema changes prior to deployment.
7 Page 7 Enterprise Single Sign-On is integrated with IBM Tivoli Identity Manager, and provides easy integration with other provisioning and password management solutions. Web-based administration and integration with provisioning solutions Administrators and help desk personnel use AccessAdmin, a Web console for the IMS Server, to manage users. Through AccessAdmin, an administrator can revoke a user s access. Administrators can easily define policy templates that may be applied to select user groups. To provide complete identity and access management, Tivoli Access Manager for Enterprise Single Sign-On is integrated with IBM Tivoli Identity Manager, and provides a complete provisioning API over SOAP/HTTPS for easy integration with other provisioning and password management solutions. Integration with user provisioning enables IT to use their provisioning solutions for identity lifecycle management, while ensuring that any new user created will automatically be created in the single sign-on system, and any de-provisioning or updating of application rights will automatically be reflected in the single sign-on system. A wide choice of authentication factors help meet the needs of different user groups with a single, integrated solution. Choice of authentication factors Enterprise Single Sign-On can help reduce password management costs by consolidating authentication credentials in the Identity Wallet. Enterprises have a choice of second factors, including strong passwords, building access badges, active radio frequency identification (RFID) badges, itag, one-time password-based authentication via cell phones or other tokens, biometrics, and USB smart cards.
8 Page 8 A wide choice of authentication factors help meet the needs of different user groups with a single integrated solution as shown in Table 1. Table 1: Authentication factors and user scenarios Authentication Factor Building access badge Active RFID Mobile device itag Biometrics USB smart tokens Strong password User Scenario and Target User Group The user taps their badge on the reader and enters a password to log in. Best for users working within corporate premises with managed desktops. The user is identified as they approach the workstation. They enter a password to log in. Best for users who need fast login/logout. The user receives a Mobile ActiveCode on SMS-enabled or -enabled mobile device. They use this code with their user name and password to log in to their extranet remotely via their browser. Best for the mobile workforce who may need access from Internet cafés and business centers. The user leverages any personal device or photo ID badge with smart labels to enable two-factor authentication. User adoption is high, and training costs are minimal. Best for users working within corporate premises with managed desktops. The user logs in using fingerprints. This is an alternative to building access badges or Active RFID badges for corporate users and removes the need for a password. However, building access badges and Active RFID are more robust. Best for users working within corporate premises with managed desktops. The user inserts a USB smart token and enters a password to log in. Best for users with high security requirements. The user enters a user name and a strong password to log in. Best for users who do not need stronger authentication.
9 Page 9 Through Web Workplace, Enterprise Single Sign-On also enables secure remote access by combining two-factor authentication with leading SSL-VPN platforms. Users can access Web, desktop and legacy applications through the SSL-VPN and enable two-factor authentication via one-time password tokens or passwords delivered to smart phones or other mobile devices. Enterprise Single Sign-On provides a customizable and scalable framework that may be used to implement custom identity and access management functions such as in-depth application auditing. Customizable end-point IAM framework With Enterprise Single Sign-On, AccessAgent software is installed at each enterprise end point. Each AccessAgent implements the three-tier end-point automation framework outlined in Figure 2. Figure 2: Enterprise Single Sign-On An end-point IAM architecture
10 Page 10 The end-point IAM framework is composed of three core layers to provide definition, flexibility and scalability: The Observer Layer provides the ability to observe presentation layer events at the end point. The Automation Triggers Layer defines automation triggers at each end point. Triggers fire when certain events are observed in the Observer Layer. The Automated Actions Layer defines automated actions to execute when a trigger is fired. This three-tier approach ensures clean separation of what, when and how the end point should interact. This clean separation provides ease of definition, flexibility and scalability. This customizable and scalable framework may be used to implement custom identity and access management functions such as in-depth application auditing beyond the native application logging capabilities, and can be used to automate complex access workflows. AccessProfiles and Plug-ins may be uploaded centrally and distributed automatically to all enterprise end points. Enterprise Single Sign-On supports the use of building access cards as second factors for logical access. Combined physical-logical access By supporting the use of existing building access cards as second factors for logical access, Enterprise Single Sign-On delivers a combined physical-logical access solution. As building access cards are already provisioned, no additional provisioning or re-badging is required.
11 Page 11 Alternatively, Enterprise Single Sign-On may turn any photo ID badge or magnetic stripe-based card into a logical access card through itag. itag is a patent-pending smart label technology that contains RFID tags, which can be affixed to personal objects, such as photo badges, cell phones or PDAs. Enterprise Single Sign-On provides single sign-on and single sign-off. Enterprise single sign-on and access automation Enterprise Single Sign-On provides single sign-on to all applications, including Web, mainframe, teletype and desktop applications. AccessStudio Wizard auto-generates XML-based AccessProfiles for single sign-on, while AccessStudio Advanced provides visual profiling for advanced AccessProfile configuration and Plug-in definition. Enterprise Single Sign-On can be configured to gracefully sign off applications by locking the screen or logging off a session. It can also be configured to automatically navigate users to any screen or to specific points of information access within applications. Complete session management Session management provides fast user switching and is a key requirement in many industries, including manufacturing, health care and warehousing. Three different types of session management options are available: Enterprise Single Sign-On provides three different types of session management. Shared desktops Support desktop sharing through a generic Microsoft Windows account, helping to ensure that users can quickly sign on and sign off at a shared kiosk. Private desktops Manage multiple private desktops on the same workstation so that users can share a kiosk while maintaining their own private sessions. Roaming desktops Provide personal desktops that follow the user as he or she roams from workstation to workstation.
12 Page 12 Enterprise Single Sign-On provides integrated self-help and loss management capabilities. Integrated self-help with loss management Complete self-help and loss management facilities cover most loss scenarios. To help ensure rapid recovery, Identity Wallets are encrypted and automatically synchronized with the IMS Server. The following loss scenarios are supported: Forgotten application password The user may view application passwords from AccessAssistant, a Web self-help system. This should happen only when single sign-on is not available from where the user is logging in. Forgotten password for Enterprise Single Sign-On During installation, the user is required to answer a select number of personal questions. They may reset passwords by correctly answering these personal questions or by requesting an authorization code from the help desk (if the user fails to correctly answer personal questions). Passwords can also be reset offline. Forgotten authentication token The user may request an authorization code from the help desk, which may be used as a temporary second factor until they regain possession of the token. Or the user may bypass the second factor by successfully answering his or her personal questions. Lost authentication token The user may request a replacement by obtaining an authorization code from the help desk. This code authorizes the user to reset authentication factors required for login.
13 Page 13 Enterprise Single Sign-On supports the workflow of all user groups in a single, integrated solution. Single sign-on across a variety of user groups Enterprise Single Sign-On caters to all user groups, as shown in Table 2. Table 2: User groups and recommended authentication factors User Group IT users Desktop business users Laptop business users Remote users Kiosk users Recommended AccessAgent Platform AccessAgent for Microsoft Windows configured as personal workstations AccessAgent for Terminal Services on servers to enable remote administration AccessAgent for Microsoft Windows configured as personal workstations AccessAgent for Microsoft Windows configured as personal workstation AccessAgent for Citrix, Microsoft Terminal Services or Web Workplace AccessAgent for Microsoft Windows configured as shared, private or roaming desktops Recommended Authentication Factor Strong passwords, or Building access badge, or itag Strong passwords, or Building access badge, or itag Strong passwords, or USB smart card, or itag Strong passwords, or One-time password tokens, or Mobile devices using Mobile ActiveCode Strong passwords, or Building access badge, or itag Enterprise Single Sign-On helps enterprises improve user productivity, facilitate regulatory compliance, decrease help desk costs, and enhance security. A unified strategy from IBM Enterprise Single Sign-On provides visibility into user activities, control over business processes and risks, and automation of access and security workflows. It helps enterprises improve user productivity, facilitate regulatory compliance, decrease help desk costs, and enhance security.
14 Page 14 IBM provides a unified strategy for enterprise security that includes powerful, cost-effective and easy-to-use identity management and access management solutions. With IBM, you can develop a solution that covers the identity and access management lifecycle while addressing security needs in a compliant, cost-effective manner. IBM not only offers best-in-class IAM solutions, but also unsurpassed breadth and integration across its security suite. IBM Unified Single Sign-On is one such integrated solution. It extends the capabilities of Tivoli Access Manager for Enterprise Single Sign-On to address end-to-end enterprise requirements for single sign-on inside, outside and between organizations. IBM enables you to focus on driving business innovation by reducing the complexity of securing the enterprise through a flexible and adaptable approach across the entire realm of IT security risk. IBM can address the big picture, including identity and access management, threat protection, managed services, mainframe security, application security, information and data security, and service management. IBM is ready to support your longterm security goals, and has the breadth and depth to address your broader security management needs. For more information To learn more about how IBM Enterprise Single Sign-On can help you better address end-point identity access management in your environment, contact your IBM sales representative or IBM Business Partner, or visit: ibm.com/tivoli
15 Page 15 About Tivoli software from IBM Tivoli software offers a service management platform for organizations to deliver quality service by providing visibility, control and automation visibility to see and understand the workings of their business; control to effectively manage their business, help minimize risk and protect their brand; and automation to help optimize their business, reduce the cost of operations and deliver new services more rapidly. Unlike IT-centric service management, Tivoli software delivers a common foundation for managing, integrating and aligning both business and technology requirements. Tivoli software is designed to quickly address an organization s most pressing service management needs and help proactively respond to changing business demands. The Tivoli portfolio is backed by world-class IBM Services, IBM Support and an active ecosystem of IBM Business Partners. Tivoli clients and Business Partners can also leverage each other s best practices by participating in independently run IBM Tivoli User Groups around the world visit: Additionally, IBM Global Financing can tailor financing solutions to your specific IT needs. For more information on great rates, flexible payment plans and loans, and asset buyback and disposal, visit: ibm.com/financing
16 The customer is responsible for ensuring compliance with legal requirements. It is the customer s sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law or regulation. Copyright IBM Corporation 2008 IBM Corporation Software Group Route 100 Somers, NY U.S.A. Produced in the United States of America December 2008 All Rights Reserved IBM, the IBM logo, ibm.com and Tivoli are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol ( or ), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at Copyright and trademark information at ibm.com/legal/copytrade.shtml. Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. Other product, company or service names may be trademarks or service marks of others. References in this publication to IBM products and services do not imply that IBM intends to make them available in all countries in which IBM operates. No part of this document may be reproduced or transmitted in any form without written permission from IBM Corporation. Product data has been reviewed for accuracy as of the date of initial publication. Product data is subject to change without notice. Any statements regarding IBM s future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. THE INFORMATION PROVIDED IN THIS DOCUMENT IS DISTRIBUTED AS IS WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IBM EXPRESSLY DISCLAIMS ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements (e.g. IBM Customer Agreement, Statement of Limited Warranty, International Program License Agreement, etc.) under which they are provided. TIW14017-USEN-00
White paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
and the software then detects and automates all password-related events for the employee, including:
Reduce costs, simplify access and audit access to applications with single sign-on IBM Single Sign-On Highlights Reduce password-related helpdesk Facilitate compliance with pri- costs by lowering the vacy
IBM Security Access Manager for Enterprise Single Sign-On
IBM Security Access Manager for Enterprise Single Sign-On Simplify password management, strengthen access security and demonstrate compliance Highlights Achieve faster time to value and higher ROI with
Enhancing Password Management by Adding Security, Flexibility, and Agility IBM Redbooks Solution Guide
Enhancing Password Management by Adding Security, Flexibility, and Agility IBM Redbooks Solution Guide The number of logins and passwords that employees must manage on a daily basis continues to be a source
Provide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
IBM Maximo Asset Management Essentials
Enterprise asset capabilities for small and midsized organizations IBM Maximo Asset Essentials Highlights Leverage enterprise asset capabilities in a package specifically designed for small and midsized
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
Service management White paper. Manage access control effectively across the enterprise with IBM solutions.
Service management White paper Manage access control effectively across the enterprise with IBM solutions. July 2008 2 Contents 2 Overview 2 Understand today s requirements for developing effective access
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations
White Paper September 2009 Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations Page 2 Contents 2 Executive
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05
Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.
Security management White paper Develop effective user management to demonstrate compliance efforts and achieve business value. September 2008 2 Contents 2 Overview 3 Understand the challenges of user
IBM asset management solutions White paper. Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations.
IBM asset management solutions White paper Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations. September 2007 2 Contents 2 Executive summary 3 Introduction
IBM Endpoint Manager for Core Protection
IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,
IBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
IBM Software Integrated Service Management: Visibility. Control. Automation.
IBM Software Integrated Service Management: Visibility. Control. Automation. Enabling service innovation 2 Integrated Service Management: Visibility. Control. Automation. Every day, the world is becoming
Reduce your data storage footprint and tame the information explosion
IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive
Effective storage management and data protection for cloud computing
IBM Software Thought Leadership White Paper September 2010 Effective storage management and data protection for cloud computing Protecting data in private, public and hybrid environments 2 Effective storage
IBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
Driving workload automation across the enterprise
IBM Software Thought Leadership White Paper October 2011 Driving workload automation across the enterprise Simplifying workload management in heterogeneous environments 2 Driving workload automation across
When millions need access: Identity management in an increasingly connected world
IBM Software Thought Leadership White Paper January 2011 When millions need access: Identity management in an increasingly connected world Best practice solutions that scale to meet today s huge numbers
IBM Tivoli Netcool network management solutions for SMB
IBM Netcool network management solutions for SMB An integrated approach enhances IT as it supports business needs for the SMB environment Highlights Automate management tasks to reduce IT workload and
IBM Tivoli Remote Control
Robust remote desktop management across the enterprise IBM Tivoli Remote Control Highlights Enables organizations to Supports Federal Desktop Core remotely manage thousands of Configuration (FDCC) and
IBM Maximo technology for business and IT agility
IBM Software Tivoli March 2010 IBM Maximo technology for business and IT agility IBM asset and service management solutions 2 IBM Maximo technology for business and IT agility Contents 2 Executive summary
IBM Tivoli Netcool network management solutions for enterprise
IBM Netcool network management solutions for enterprise The big picture view that focuses on optimizing complex enterprise environments Highlights Enhance network functions in support of business goals
Effective Storage Management for Cloud Computing
IBM Software April 2010 Effective Management for Cloud Computing April 2010 smarter storage management Page 1 Page 2 EFFECTIVE STORAGE MANAGEMENT FOR CLOUD COMPUTING Contents: Introduction 3 Cloud Configurations
Empowering intelligent utility networks with visibility and control
IBM Software Energy and Utilities Thought Leadership White Paper Empowering intelligent utility networks with visibility and control IBM Intelligent Metering Network Management software solution 2 Empowering
IBM Tivoli Storage Manager for Virtual Environments
IBM Storage Manager for Virtual Environments Non-disruptive backup and instant recovery: Simplified and streamlined Highlights Simplify management of the backup and restore process for virtual machines
Lots of workers, many applications, multiple locations......and you need one smart way to handle access for all of them.
Lots of workers, many applications, multiple locations......and you need one smart way to handle access for all of them. imprivata OneSign The Converged Authentication and Access Management Platform The
Extending Identity and Access Management
Extending Identity and Access Management Michael Quirin Sales Engineer Citrix Systems 1 2006 Citrix Systems, Inc. All rights reserved. Company Overview Leader in Access Infrastructure NASDAQ 100 and S&P
IBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
IBM Tivoli Asset Management for IT
Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs of IT assets with a single product installation that tracks and manages hardware, software and related
IBM Endpoint Manager for Server Automation
IBM Endpoint Manager for Server Automation Leverage advanced server automation capabilities with proven Endpoint Manager benefits Highlights Manage the lifecycle of all endpoints and their configurations
Overcoming challenges of asset management amid declining federal budgets
IBM Software Government Thought Leadership White Paper Overcoming challenges of asset management amid declining federal budgets Extending government infrastructure life cycles with IBM Maximo solutions
IBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
IBM Tivoli Service Request Manager
Deliver high-quality services while helping to control cost IBM Tivoli Service Request Manager Highlights Streamline incident and problem management processes for more rapid service restoration at an appropriate
IBM Tivoli Netcool Configuration Manager
IBM Netcool Configuration Manager Improve organizational management and control of multivendor networks Highlights Automate time-consuming device configuration and change management tasks Effectively manage
IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution.
IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services Combine resources for one complete online business security solution. Big e-business opportunities demand security to match
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
White paper September 2009. Realizing business value with mainframe security management
White paper September 2009 Realizing business value with mainframe security management Page 2 Contents 2 Executive summary 2 Meeting today s security challenges 3 Addressing risks in the mainframe environment
expanding web single sign-on to cloud and mobile environments agility made possible
expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online
Achieve greater efficiency in asset management by managing all your asset types on a single platform.
Asset solutions To support your business objectives Achieve greater efficiency in asset by managing all your asset types on a single platform. When you use Maximo Asset Management to help maximize the
IBM WebSphere ILOG Rules for.net
Automate business decisions and accelerate time-to-market IBM WebSphere ILOG Rules for.net Business rule management for Microsoft.NET and SOA environments Highlights Complete BRMS for.net Integration with
IBM Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
Redpaper Axel Buecker Kenny Chow Jenny Wong
Redpaper Axel Buecker Kenny Chow Jenny Wong A Guide to Authentication Services in IBM Security Access Manager for Enterprise Single Sign-On Introduction IBM Security Access Manager for Enterprise Single
Real-time asset location visibility improves operational efficiencies
Real-time asset location visibility improves operational efficiencies Offering smart capabilities for asset tracking to dramatically improve efficiency and lower cost Highlights Improve asset utilization
Centralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows Desktop Self-service Password Reset Layer v.3.2-007 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200
Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003
Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
The Benefits of an Industry Standard Platform for Enterprise Sign-On
white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed
Two-Factor Authentication
Two-Factor Authentication A Total Cost of Ownership Viewpoint CONTENTS + Two-Factor Authentication 3 A Total Cost of Ownership Viewpoint + Introduction 3 + Defining Total Cost of Ownership 3 + VeriSign
IBM WebSphere Premises Server
Integrate sensor data to create new visibility and drive business process innovation IBM WebSphere Server Highlights Derive actionable insights that support Enable real-time location tracking business
Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
Collaboration solutions for midsized businesses Buyer s guide
Collaboration solutions for midsized businesses Buyer s guide Increase productivity by improving collaboration across and beyond your business. Give employees access to the information, people and resources
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems Proactively address regulatory compliance requirements and protect sensitive data in real time Highlights Monitor and audit data activity
Reducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
How To Create A Help Desk For A System Center System Manager
System Center Service Manager Vision and Planned Capabilities Microsoft Corporation Published: April 2008 Executive Summary The Service Desk function is the primary point of contact between end users and
IBM Tivoli Federated Identity Manager
IBM Tivoli Federated Identity Manager Employ user-centric federated access management to enable secure online business collaboration Highlights Enhance business-to-business and business-to-consumer collaborations
IBM SmartCloud Workload Automation
IBM SmartCloud Workload Automation Highly scalable, fault-tolerant solution offers simplicity, automation and cloud integration Highlights Gain visibility into and manage hundreds of thousands of jobs
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Low-latency market data delivery to seize competitive advantage. WebSphere Front Office for Financial Markets: Fast, scalable access to market data.
Low-latency market data delivery to seize competitive advantage WebSphere Front Office for Financial Markets: Fast, scalable access to market data. Data from SIAC, NASDAQ and NYSE indicates a 158% increase
Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database.
IBM Service Management solutions and the service desk White paper Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database. December
Integrating Hitachi ID Suite with WebSSO Systems
Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication
How To Use Ibm Tivoli Monitoring Software
Monitor and manage critical resources and metrics across disparate platforms from a single console IBM Tivoli Monitoring Highlights Help improve uptime and shorten Help optimize IT service delivery by
IBM Tivoli Netcool network management solutions for VoIP
IBM Netcool network management solutions for VoIP Putting service providers on the path to fulfilling the promises of VoIP Highlights Proactively manage the VoIP infrastructure to help avoid problems and
Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004
Oracle Identity Management: Integration with Windows An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows Introduction... 3 Goals for Windows Integration... 4 Directory
ORACLE BUSINESS INTELLIGENCE SUITE ENTERPRISE EDITION PLUS
Oracle Fusion editions of Oracle's Hyperion performance management products are currently available only on Microsoft Windows server platforms. The following is intended to outline our general product
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
Address IT costs and streamline operations with IBM service request and asset management solutions.
Service management solutions To support your IT objectives Address IT costs and streamline operations with IBM service request and asset management solutions. Highlights Help service desk technicians become
IBM Tivoli Access Manager for Enterprise Single Sign-On
Deliver seamless access to applications with an easy-to-deploy solution IBM Single Sign-On Highlights Help simplify the employee experience by eliminating the need to remember and manage user names and
Asset management for local government
IBM Software Government Thought Leadership White Paper Asset management for local government Achieving unified enterprise asset management with IBM Maximo software 2 Asset management for local government
Passlogix Sign-On Platform
Passlogix Sign-On Platform The emerging ESSO standard deployed by leading enterprises Extends identity management to the application and authentication device level No modifications to existing infrastructure
Security management solutions White paper. Extend business reach with a robust security infrastructure.
Security management solutions White paper Extend business reach with a robust security infrastructure. July 2007 2 Contents 2 Overview 3 Adapt to today s security landscape 4 Drive value from end-to-end
IBM Maximo Asset Management solutions for the oil and gas industry
IBM Software Oil and Gas IBM Maximo Asset solutions for the oil and gas industry Helping oil and gas companies achieve operational excellence 2 IBM Maximo Asset solutions for the oil and gas industry Highlights
ORACLE BUSINESS INTELLIGENCE SUITE ENTERPRISE EDITION PLUS
ORACLE BUSINESS INTELLIGENCE SUITE ENTERPRISE EDITION PLUS PRODUCT FACTS & FEATURES KEY FEATURES Comprehensive, best-of-breed capabilities 100 percent thin client interface Intelligence across multiple
5 Day Imprivata Certification Course Agenda
Class time consists of a break in the morning and afternoon as well as an allotted time for lunch. Lengths of breaks are at the discretion of the instructor based on the time to cover material. 5 Day Imprivata
The IBM Cognos family
IBM Software Business Analytics Cognos software The IBM Cognos family Analytics in the hands of everyone who needs it The IBM Cognos family Overview Business intelligence (BI) and business analytics have
Citrix Systems, Inc.
Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change
Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management
Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309
IBM Tivoli Storage FlashCopy Manager
IBM Storage FlashCopy Manager Online, near-instant snapshot backup and restore of critical business applications Highlights Perform near-instant application-aware snapshot backup and restore, with minimal
Address IT costs and streamline operations with IBM service desk and asset management.
Asset management and service desk solutions To support your IT objectives Address IT costs and streamline operations with IBM service desk and asset management. Highlights Help improve the value of IT
IBM Rational AppScan: enhancing Web application security and regulatory compliance.
Strategic protection for Web applications To support your business objectives IBM Rational AppScan: enhancing Web application security and regulatory compliance. Are untested Web applications putting your
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
End-to-End Identity Management With Oblix and Microsoft WHITEPAPER
End-to-End Identity Management With Oblix and Microsoft WHITEPAPER Copyright 2004 Oblix, Inc. All rights reserved This white paper is for informational purposes only. Oblix makes no warranties, expressed
IBM Tivoli Storage Manager
Help maintain business continuity through efficient and effective storage management IBM Tivoli Storage Manager Highlights Increase business continuity by shortening backup and recovery times and maximizing
IBM Tivoli Compliance Insight Manager
Facilitate security audits and monitor privileged users through a robust security compliance dashboard IBM Highlights Efficiently collect, store, investigate and retrieve logs through automated log management
Identity and Access Management
Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
IBM SmartCloud Monitoring
IBM SmartCloud Monitoring Gain greater visibility and optimize virtual and cloud infrastructure Highlights Enhance visibility into cloud infrastructure performance Seamlessly drill down from holistic cloud
Virtual Contact Center
Virtual Contact Center Zendesk Integration Configuration Guide Version 7.1 Revision 1.0 Copyright 2012, 8x8, Inc. All rights reserved. This document is provided for information purposes only and the contents
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Understanding the real risk for asset-intensive companies
IBM Software Thought Leadership White Paper December 2011 Understanding the real risk for asset-intensive companies Five myths behind the value of ERP solutions as an asset management tool 2 Understanding
Business-Driven, Compliant Identity Management
SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance
Approaches to Enterprise Identity Management: Best of Breed vs. Suites
Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity
IBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
The Encryption Anywhere Data Protection Platform
The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,
Authentication: Password Madness
Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to