When millions need access: Identity management in an increasingly connected world
|
|
|
- Marlene Karin Tyler
- 10 years ago
- Views:
Transcription
1 IBM Software Thought Leadership White Paper January 2011 When millions need access: Identity management in an increasingly connected world Best practice solutions that scale to meet today s huge numbers of users
2 2 When millions need access: Identity management in an increasingly connected world Contents 2 Introduction 3 Effective management based on self service and access control 4 Security and compliance across the full user life cycle 5 Paths to success in the identity and access management environment 5 Use case 1: Portal-based access for large populations of users 6 Use case 2: User access to cloud-based services 7 Use case 3: Business partner access and application integration 8 IBM self-service solutions for internal and external users 11 The IBM portfolio of security management solutions 11 IBM: Your trusted partner for leading IT security solutions 12 For more information 12 About Tivoli software from IBM Introduction There is one thing that customers, business partners, vendors and all your other constituents want these days. They want in. They want access to your network or your cloud to make purchases, find information or use applications. And there are thousands in many cases millions of them. Their interest and involvement can be good for business. But how do you manage such a number? Manual procedures for identity management everything from granting access to assets to managing user accounts are a classic example of processes that simply don t scale. They can work when the number of users is small. But manual procedures can become a significant burden when numbers reach into the thousands and impossible when the numbers stretch to millions. Just think about resetting passwords. How could you maintain a help desk big enough for a world full of customers? As organizations transform business by opening their systems to large numbers of internal and external online users, many of whom are mobile, they are increasingly adopting automated solutions that secure sensitive data, support end-user self service and help resolve problems. For today s instrumented, interconnected and intelligent IT operations, best practices for identity management can help ensure the secure, optimized and regulatory-compliant operations necessary to meet the access demands of a smarter planet.
3 IBM Software 3 Effective management based on self service and access control Today s need for effective identity management is the result of an explosive growth in connectivity. An insurance company, for example, that until recently managed access for a few thousand employees now needs to manage millions of customers and partners conducting online transactions through a sales portal. A government agency previously managing access only for its employees now needs to manage access for millions of citizens and a wide range of other agencies accessing information online. Organizations in areas such as healthcare, finance and other customer services industries rely heavily on interaction and data exchange between large numbers of partners and consumers. The result has been a sudden and unprecedented increase in the scale and requirements of online business operations and an increased demand on organizations identity management systems. Organizations now need systems that can give employees, business partners and external end users the self-service capabilities they need to quickly enroll for new services and resolve individual problems including the ever-present issue of password resets without having to contact the help desk. At the same time, organizations need systems that give administrators whether IT operators, line-of-business managers or human resources professionals control over permissions and other user access functions. IBM offers industry-leading solutions based on the principles of the IBM Security Solutions Secure by Design initiative to meet scalable identity management needs. Developed to help build security into the IT infrastructure from the ground up, the Secure by Design initiative helps organizations incorporate security into the fabric of the services they deliver, making security intrinsic to business processes and daily operations. IBM Tivoli identity management security offerings support the Secure by Design initiative with solutions for user administration and management, resource protection, and audit and compliance reporting. IBM Tivoli Federated Identity Manager provides capabilities such as business-to-consumer self-service enrollment and federated single sign-on (SSO) support that organizations can supply to their external constituents. IBM Tivoli Identity Manager is an automated, policy-based solution that manages the life cycle of user access across IT environments within the organization. IBM Tivoli Security Policy Manager allows organizations to centralize fine-grained security policy management to enforce access control across applications, databases, portals and business services.
4 4 When millions need access: Identity management in an increasingly connected world Security and compliance across the full user life cycle An effective identity management solution meets a full range of online business needs from pressures to stay competitive by providing greater access to more information and services, to requirements to demonstrate compliance by controlling and monitoring information access. The solution should include tools for restricting user access to only those resources appropriate to their role and/or job function, centralized user self service, simplified administration and approvals processing, periodic revalidation of user access rights, and documentation of policy controls. Add to all that the need to manage the rising costs of account provisioning and deprovisioning, recertification of access rights, help-desk calls, password resets and other administrative tasks. As organizations grant access to different types of users including employees, customers, business partners and suppliers, they need best-practice solutions that can support the full life cycle of user identity, from the efficient onboarding of new users to their final off-boarding and the elimination of unidentified or orphan accounts. Externally, they need a secure, easy-to-use solution that makes minimal demands on the organization s IT staff to administer. Internally, they need to create user accounts in ways that allow new hires or employees with new roles to be productive as soon as possible. To avoid potential security exposures, they need to retire accounts and associated access privileges quickly for employees who leave the company. Cloud environments usually support a large and diverse community of users, so security controls are especially critical. Identity federation and capabilities for rapid onboarding must be available to coordinate authentication and authorization with the enterprise s back-end or third-party systems. A standards-based, single sign-on capability is required to simplify end-user logins for both internally hosted applications and the cloud, allowing end users to easily and quickly leverage cloud services. When it comes to compliance, organizations need enterprisewide capabilities to ensure that both internal and external access are governed by effective authentication, to monitor authorization and network traffic, and to support the system with comprehensive audit and reporting capabilities. Regardless of the type of user, the solution should enhance security by helping to fill gaps in security measures. It should mitigate the risk of issues such as fraud, theft of intellectual property or loss of customer data. It should help reduce costs by streamlining business and IT processes that grant users access to resources.
5 IBM Software 5 Paths to success in the identity and access management environment Each organization has to determine the details of ensuring effective identity management, because each organization has its own needs, goals and set of users. Leading use cases for identity and access management, however, typically fall into three categories: Portal-based access to information for a large population of users User access to cloud-based services Business partner access and application integration In each case, organizations are transforming the way they provide access. To achieve this transformation, they typically provide self-service functions as they help ensure secure operations and support regulatory compliance. For portal-based scenarios which are rapidly increasing in numbers and complexity as banking, retail and public sector organizations increase the value-added services in their online operations the organization not only must address issues of security, scalability and usability, it must manage back-end tasks for application integration. Organizations deploying serviceoriented architecture (SOA) solutions need an effective policybased approach that incorporates security management and services that can be integrated with existing SOA components. Use case 1: Portal-based access for large populations of users A large state health information exchange portal needs to provide 3 million consumers and several hundred payers and associated providers with access to clinical and administrative data. It also must enable secure collaboration among healthcare organizations, facilities operators and insurance companies. It needs a solution that can centrally manage user authentication to ensure that patient records remain private as it securely expands access to consumers, payers and providers. By ensuring identity management and enforced access control, the solution must support compliance with Health Insurance Portability and Accountability Act (HIPAA) security regulations and updated healthcare information exchange (HIE) requirements. How Tivoli Identity Manager helps Through the use of roles, accounts and access permissions, Tivoli Identity Manager helps automate the creation, modification and termination of user privileges throughout the entire user life cycle. For internal enterprise users and for business partners or trusted suppliers who need access to internal company resources, Tivoli Identity Manager enables the organization to grant permission to access information and applications and then to control access as the user s role and responsibilities change. Users are granted self-service capabilities in areas such as password reset, but the detailed workflow and processes for defining access rights based on role/job requirements and for avoiding access conflicts of interest make Tivoli Identity Manager a solution that is most appropriate for effective internal identity management. How Tivoli Federated Identity Manager helps For business-to-business and business-to-consumer scenarios, in which organizations extend access to large numbers of external users, Tivoli Federated Identity Manager provides self-service enrollment capabilities such as the selection of passwords along with secret questions and answers, as well as federated single sign-on and centralized authentication support to enforce access control. This automated user validation reduces the workload for IT administrators. Tivoli Federated Identity Manager can expand collaboration with business partners who need limited access to internal resources by providing entry-level federation capabilities and by scaling to larger numbers of applications and users when necessary. The result: lower identity management costs, improved compliance and reporting, and simplified integration of services including centralized user access to software as a service.
6 6 When millions need access: Identity management in an increasingly connected world Use case 2: User access to cloud-based services A global financial services company with 120,000 employees, 3 million external users and operations in 50 countries implements a cloud computing architecture to standardize their IT infrastructure and services. In the process, the company consolidates several data centers into a few next-generation data centers. The hybrid cloud solution that results provides the company with an automated, virtualized infrastructure on a single platform with different severs, self-service request-driven provisioning from a Web 2.0 service catalog, and secure access to services based on roles and business needs. To achieve security management in its new cloud-based data centers, the organization implements IBM Tivoli Federated Identity Manager, securing collaboration with business partners and providing single sign-on for external users into the hybrid cloud environment. Securing access to cloud-based applications and services Enterprise IT organization On-premise private cloud Dynamic infrastructure Trusted partner/ hybird cloud Federated identity Security events Data entitlements Public cloud Similarly, an organization with 2,000 software engineers spread across 25 teams implements a developer cloud environment to give teams access to services whenever and wherever they need it. Users log in to request capabilities including operating systems, memory, disk space, middleware and more and gain access in minutes. To achieve secure and dynamic access for users and to eliminate lag times in delivering that access, the organization implements Tivoli Identity Manager. Password resets that used to take hours or days to complete now take only minutes because users can log into a self-service portal and reset their passwords themselves. As new members join the team, they can gain rapid access to services, and as members depart, IT staff can remove their access rights to all systems with one command, rather than logging into dozens of different systems. With Tivoli Federated Identity Manager, the organization can centrally control access for large numbers of users to its cloud-based services hosted by external providers such as salesforce.com. How Tivoli Identity Manager helps Giving internal users access to a cloud-based application is essentially the same as providing access to other applications. Tivoli Identity Manager provides identity management capabilities that enable the organization to provide internal users, including privileged users, with self service and access rights to cloud-based services.
7 IBM Software 7 How Tivoli Federated Identity Manager helps Using cloud-based computing to open applications and data over the Internet to a large group of users everyone from employees in other parts of the organization to customers and business partners requires particular attention to security. The larger the group, the more difficult it is to manage user identity. With Tivoli Federated Identity Manager, however, the organization can centrally manage and enforce access policies to on- and offpremise applications and services (including integrating with software-as-a-service and cloud-based solutions) and reduce IT administration costs while helping enterprises strengthen and automate user access rights. Employees Business partners Single sign-on centralized access management Cross-domain web applications Single domain web applications In a typical scenario, authentication of the user takes place outside the cloud and involves IBM Tivoli Access Manager for e-business (for strong authentication). The user s identity is then federated into the cloud using Tivoli Federated Identity Manager (for user-facing sign-on).the entire process is transparent to the user. Tivoli Federated Identity Manager s single signon capabilities enable the user to go directly to cloud-based applications and information without having to manage identities within the cloud. The Tivoli Federated Identity Manager package includes Tivoli Access Manager for e-business to support this scenario. In addition, IBM offers Tivoli Federated Identity Manager Business Gateway, which provides standalone capabilities to support federated single sign-on and integration into cloud and software-as-a-service offerings. Use case 3: Business partner access and application integration An insurance company is migrating its legacy, host-based application to a new portal-based solution and needs to provide outsourced services providers, mobile agents and clients with Clients Enterprise applications Single sign-on can simplify user access to multiple applications and sources of data. information on their policies and contracts. The organization also requires fine-grained authorized access to insurance policies and contracts based on roles and additional attributes. Concern for compliance and data security issues lead the company to deploy Tivoli Federated Identity Manager and Tivoli Security Policy Manager to enable easy and secure single sign-on capabilities for both internal and external users, ensure an auditable record across the enterprise, and enforce data-level access control on a need-to-know basis.
8 8 When millions need access: Identity management in an increasingly connected world How Tivoli Federated Identity Manager helps Tivoli Federated Identity Manager simplifies application integration for identity management via an identity mediation service. Instead of requiring tiers of access for reaching the application, the solution validates, transforms and authenticates users one time to provide application access, whether it is to legacy mainframe, Java or Microsoft.NET based applications. For enterprise users and business partners who require special access to secure information, this use of identity management provides a record as identities are mapped to access for audit and compliance use. How Tivoli Security Policy Manager helps Tivoli Security Policy Manager provides organizations the ability to manage and enforce fine-grained entitlement and data-level access control on a need-to-know basis. In the case of the insurance company, Tivoli Security Policy Manager allows mobile employees access to client contracts based on roles and on additional business attributes and context critical to ensuring privacy and data security. IBM self-service solutions for internal and external users IBM s identity management solutions Tivoli Identity Manager and Tivoli Federated Identity Manager provide self-service functions for streamlined management of internal or external access to business information and applications. The results can be dramatic up to 80 percent reduction in provisioning time for new employee accounts, up to 40 percent reduction in identity management administrative costs, and up to 35 percent reduction in password-related calls to the help desk. 1 Tivoli Identity Manager provides complete identity life cycle management capabilities that support enrollment, permission and access control for the complete period in which a person is employed at a company with management functions that also work for business partners, suppliers and other external constituents who may need trusted access to internal resources. The solution combines role management and user provisioning to deliver access rights to users. In addition, a hierarchical role structure streamlines administration and provides visibility into user access to infrastructure resources. Web self-service for managing roles, accounts and passwords further simplifies administration and reduces administrative costs by enabling users to perform tasks themselves. Self-service requests can be configured to define which attributes are allowed for self-service and which require approval. This is ideal for a high-volume, large-scale web environment where the exact identity of users is not known. When users must access resources beyond their own organization, Tivoli Federated Identity Manager provides a highly scalable business-to-consumer self-service solution for enrollment along with authentication in which: External users initiate enrollment and select their password The organization customizes challenge/response, strong authentication and access to applications. The user deletes the account when it is no longer needed. Tivoli Federated Identity Manager provides the federated single sign-on and user access management techniques that are necessary for integration across organizational boundaries.
9 IBM Software 9 The solution provides an identity trust management framework that enables an organization to know who is connecting to resources and what credentials they are using without having to manage users individually. This is ideal for protecting assets where users are connected to critical resources from access points over the Internet or other less secure environments. The two solutions can be deployed independently or together. When Tivoli Federated Identity Manager is deployed with Tivoli Identity Manager, the combination can provide access to an expanded set of applications and services. Organizations also can employ a phased implementation to gradually increase the number of users supported. This enables the organization to prove the solution s business value with a smaller initial set of users, and then expand the number of supported users over time. Tivoli Identity Manager This automated, centralized, policy-based solution utilizes roles, accounts and access permissions to manage user access throughout the entire user life cycle. Using user self-service, delegated administration, automated approvals processing, periodic revalidation of access rights, and documentation of controls, it can help increase user efficiency, reduce IT administration costs, enforce security and manage compliance. Tivoli Identity Manager is designed to reduce cost and risk by easing the onboarding and off-boarding of users, and by reporting on user activity and ongoing access certification. Tivoli Identity Manager is a centralized source for identity management throughout the user life cycle. Tivoli Identity Manager helps organizations meet major challenges of identity management: meeting internal and regulatory compliance requirements, maintaining an effective security posture, and achieving a measurable return on investment.
10 10 When millions need access: Identity management in an increasingly connected world Using Tivoli Identity Manager, the organization can: Simplify and reduce the cost of administration with streamlined group management and bulk user recertification. Reduce setup time and training with simplified policy, workflow and configuration. Support enhanced security and reduce help-desk costs with centralized password management. Correct and/or remove non-compliant access rights automatically or through periodic access recertification workflows. Enhance security and compliance with separation of duties. Define processes for workflow and provisioning using predefined templates. Separation-of-duties capabilities can strengthen security and compliance by creating, modifying or deleting policies that exclude users from membership in multiple roles that may present a business conflict. For example, a user in an accounts receivable role cannot also have an accounts payable role. This preventive approach can guard against violations occurring in the first place. Tivoli Identity Manager supports role-based provisioning, which grants access rights according to corporate policies and individual duties, as well as request-based user provisioning, which automatically routes a user s requests for access to the appropriate manager for approval. The resulting flexibility helps organizations administer quick, secure user access. It enables the provisioning of new users in minutes rather than days so they can be productive as soon as possible. Tivoli Federated Identity Manager Tivoli Federated Identity Manager provides a central, standardsbased web access management system to manage and enforce user authentication, single sign-on and self service for businessto-business, business-to-employee and business-to-consumer deployments across the enterprise. For scenarios in which the number of consumers connecting and interacting with a company often number in the millions, this user-centric solution relieves the complexity and expense of provisioning and managing user accounts. Employees, Contractors Clients, Consumers Third Parties Tivoli Federated Identity Manager Line of Business Services Cloud Services Partner or Outsourced Services Examples: Java,.NET, Mainframe Applications Examples: SaaS, Private, Public, Hybrid Services Examples: Web Services, Portals Tivoli Federated Identity Manager provides users external to the organization with easy-to-use, self-service access to services. Tivoli Federated Identity Manager helps organizations establish a framework for knowing which users are connected to services and what credentials are being used to connect without having to manage individual users.
11 IBM Software 11 Using Tivoli Federated Identity Manager, the organization can: Support user self-care for business-to-consumer and mobile user scenarios with initial password selection, password change/reset, and the ability to customize challenge/response for customer-specific needs. Manage user authentication and identification information about business partners through multiple open standardsbased identity and security tokens. Reduce administrative costs, establish trust and facilitate compliance by managing, mapping and propagating user identities. Simplify integration between the organization s and its business partners websites to reduce security exposure. Manage and enforce access to multiple services with a single sign-on to improve the user experience with Tivoli Access Manager for e-business. Provide federated single sign-on for cloud and software-as-aservice scenarios using Tivoli Federated Identity Manager Business Gateway. Tivoli Federated Identity Manager provides automation for creating accounts, creating or modifying user profiles, and creating and changing passwords or secret questions. Policy-based integrated security management supports SOA services, and security administration is simplified for cross-company business processes. The IBM portfolio of security management solutions Tivoli Identity Manager and Tivoli Federated Identity Manager are included within IBM Tivoli Identity and Access Assurance, a broader solution that also enforces and monitors access in a closed-loop process that supports compliance. Tivoli Identity and Access Assurance provides automated and policy-based management for user accounts, centralizes authorization for applications and provides federated single sign-on capabilities. It provides policy-based access control for businesscritical applications, files and operating platforms. It automates monitoring, investigating and reporting on user activity. IBM: Your trusted partner for leading IT security solutions Tivoli Identity Manager and Tivoli Federated Identity Manager are part of the comprehensive IBM Security Framework, a portfolio of software, hardware and services that helps organizations address security challenges for users and identities, data and information, applications and processes, networks, servers and endpoints, and physical infrastructures. Facilitating the instrumented, interconnected and intelligent IT operations of a smarter planet, IBM Security Solutions deliver real-time visibility, centralized control and enhanced security for the entire IT infrastructure, helping clients address cost, complexity and compliance issues.
12 For more information To learn more about Tivoli Identity Manager, Tivoli Federated Identity Manager and Tivoli Security Policy Manager, or IBM Security Solutions, contact your IBM sales representative or IBM Business Partner, or visit: ibm.com/security About Tivoli software from IBM Tivoli software from IBM helps organizations efficiently and effectively manage IT resources, tasks and processes to meet ever-shifting business requirements and deliver flexible and responsive IT service management, while helping to reduce costs. The Tivoli portfolio spans software for security, compliance, storage, performance, availability, configuration, operations and IT life cycle management, and is backed by world-class IBM services, support and research. Copyright IBM Corporation 2011 IBM Corporation Software Group Route 100 Somers, NY U.S.A. Produced in the United States of America January 2011 All Rights Reserved IBM, the IBM logo, ibm.com and Tivoli are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol ( or ), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the web at Copyright and trademark information at ibm.com/legal/copytrade.shtml Microsoft is a trademark of Microsoft Corporation in the United States, other countries, or both. Java and all Java-based trademarks and logos are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Other company, product and service names may be trademarks or service marks of others. References in this publication to IBM products and services do not imply that IBM intends to make them available in all countries in which IBM operates. No part of this document may be reproduced or transmitted in any form without written permission from IBM Corporation. The customer is responsible for ensuring compliance with legal requirements. It is the customer s sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law or regulation. 1 Results and savings based on IBM customer experience from installed systems. Product data has been reviewed for accuracy as of the date of initial publication. Product data is subject to change without notice. Any statements regarding IBM s future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. The information provided in this document is distributed as is without any warranty, either express or implied. IBM expressly disclaims any warranties of merchantability, fitness for a particular purpose or noninfringement. IBM products are warranted according to the terms and conditions of the agreements (e.g. IBM Customer Agreement, Statement of Limited Warranty, International Program License Agreement, etc.) under which they are provided. Please Recycle TIW14069-USEN-00
Provide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.
Security management White paper Develop effective user management to demonstrate compliance efforts and achieve business value. September 2008 2 Contents 2 Overview 3 Understand the challenges of user
White paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
Service management White paper. Manage access control effectively across the enterprise with IBM solutions.
Service management White paper Manage access control effectively across the enterprise with IBM solutions. July 2008 2 Contents 2 Overview 2 Understand today s requirements for developing effective access
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
IBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
IBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
IBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
IBM Tivoli Federated Identity Manager
IBM Tivoli Federated Identity Manager Employ user-centric federated access management to enable secure online business collaboration Highlights Enhance business-to-business and business-to-consumer collaborations
IBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
IBM Tivoli Storage Manager for Virtual Environments
IBM Storage Manager for Virtual Environments Non-disruptive backup and instant recovery: Simplified and streamlined Highlights Simplify management of the backup and restore process for virtual machines
Consolidated security management for mainframe clouds
Security Thought Leadership White Paper February 2012 Consolidated security management for mainframe clouds Leveraging the mainframe as a security hub for cloud-computing environments 2 Consolidated security
IBM Tivoli Netcool Configuration Manager
IBM Netcool Configuration Manager Improve organizational management and control of multivendor networks Highlights Automate time-consuming device configuration and change management tasks Effectively manage
White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview
White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4
IBM Software Integrated Service Management: Visibility. Control. Automation.
IBM Software Integrated Service Management: Visibility. Control. Automation. Enabling service innovation 2 Integrated Service Management: Visibility. Control. Automation. Every day, the world is becoming
IBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
Driving workload automation across the enterprise
IBM Software Thought Leadership White Paper October 2011 Driving workload automation across the enterprise Simplifying workload management in heterogeneous environments 2 Driving workload automation across
IBM Endpoint Manager for Core Protection
IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly
IBM Maximo Asset Management Essentials
Enterprise asset capabilities for small and midsized organizations IBM Maximo Asset Essentials Highlights Leverage enterprise asset capabilities in a package specifically designed for small and midsized
Overcoming challenges of asset management amid declining federal budgets
IBM Software Government Thought Leadership White Paper Overcoming challenges of asset management amid declining federal budgets Extending government infrastructure life cycles with IBM Maximo solutions
IBM Tivoli Service Request Manager
Deliver high-quality services while helping to control cost IBM Tivoli Service Request Manager Highlights Streamline incident and problem management processes for more rapid service restoration at an appropriate
Effective storage management and data protection for cloud computing
IBM Software Thought Leadership White Paper September 2010 Effective storage management and data protection for cloud computing Protecting data in private, public and hybrid environments 2 Effective storage
IBM Software Cloud service delivery and management
IBM Software Cloud service delivery and management Rethink IT. Reinvent business. 2 Cloud service delivery and management Virtually unparalleled change and complexity On this increasingly instrumented,
Effective Storage Management for Cloud Computing
IBM Software April 2010 Effective Management for Cloud Computing April 2010 smarter storage management Page 1 Page 2 EFFECTIVE STORAGE MANAGEMENT FOR CLOUD COMPUTING Contents: Introduction 3 Cloud Configurations
Safeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
Select the right solution for identity and access governance
IBM Security Buyer s Guide June 2015 Select the right solution for identity and access governance Protecting critical assets from unauthorized access 2 Select the right solution for identity and access
IBM Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
IBM Tivoli Identity Manager
Automated, role-based user management and provisioning of user services IBM Tivoli Identity Manager Reduce help-desk costs and IT staff workload with Web self-service and password reset/synch interfaces
Consolidating security across platforms with IBM System z
IBM Software Thought Leadership White Paper September 2010 Consolidating security across platforms with IBM System z Protect your business-critical information by leveraging the mainframe as a security
Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations
White Paper September 2009 Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations Page 2 Contents 2 Executive
Security management solutions White paper. Extend business reach with a robust security infrastructure.
Security management solutions White paper Extend business reach with a robust security infrastructure. July 2007 2 Contents 2 Overview 3 Adapt to today s security landscape 4 Drive value from end-to-end
IBM Tivoli Netcool network management solutions for enterprise
IBM Netcool network management solutions for enterprise The big picture view that focuses on optimizing complex enterprise environments Highlights Enhance network functions in support of business goals
Reduce your data storage footprint and tame the information explosion
IBM Software White paper December 2010 Reduce your data storage footprint and tame the information explosion 2 Reduce your data storage footprint and tame the information explosion Contents 2 Executive
IBM Tivoli Netcool network management solutions for SMB
IBM Netcool network management solutions for SMB An integrated approach enhances IT as it supports business needs for the SMB environment Highlights Automate management tasks to reduce IT workload and
Strategies for assessing cloud security
IBM Global Technology Services Thought Leadership White Paper November 2010 Strategies for assessing cloud security 2 Securing the cloud: from strategy development to ongoing assessment Executive summary
IBM asset management solutions White paper. Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations.
IBM asset management solutions White paper Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations. September 2007 2 Contents 2 Executive summary 3 Introduction
Address IT costs and streamline operations with IBM service request and asset management solutions.
Service management solutions To support your IT objectives Address IT costs and streamline operations with IBM service request and asset management solutions. Highlights Help service desk technicians become
Cloud computing: Innovative solutions for test environments
IBM Global Services April 2009 Cloud computing: Innovative solutions for test environments Speed test cycles and reduce cost to gain a competitive edge Page No.2 Contents 2 Executive summary 3 Leading
<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
Improve business agility with WebSphere Message Broker
Improve business agility with Message Broker Enhance flexibility and connectivity while controlling costs and increasing customer satisfaction Highlights Leverage business insight by dynamically enriching
Gain a competitive edge through optimized B2B file transfer
Gain a competitive edge through optimized B2B file transfer Contents: 1 Centralized systems enable business success 2 Business benefits of strategic file transfer that you can experience for yourself 2
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
For healthcare, change is in the air and in the cloud
IBM Software Healthcare Thought Leadership White Paper For healthcare, change is in the air and in the cloud Scalable and secure private cloud solutions can meet the challenges of healthcare transformation
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
Implement a unified approach to service quality management.
Service quality management solutions To support your business objectives Implement a unified approach to service quality management. Highlights Deliver high-quality software applications that meet functional
Enterprise content management solutions Better decisions, faster. Storing, finding and managing content in the digital enterprise.
Enterprise content management solutions Better decisions, faster Storing, finding and managing content in the digital enterprise. Streamlines the collection, protection, sharing and distribution of digital
Asset management for local government
IBM Software Government Thought Leadership White Paper Asset management for local government Achieving unified enterprise asset management with IBM Maximo software 2 Asset management for local government
IBM Tivoli Storage FlashCopy Manager
IBM Storage FlashCopy Manager Online, near-instant snapshot backup and restore of critical business applications Highlights Perform near-instant application-aware snapshot backup and restore, with minimal
Quest One Identity Solution. Simplifying Identity and Access Management
Quest One Identity Solution Simplifying Identity and Access Management Identity and Access Management Challenges Operational Efficiency Security Compliance Too many identities, passwords, roles, directories,
Real-time asset location visibility improves operational efficiencies
Real-time asset location visibility improves operational efficiencies Offering smart capabilities for asset tracking to dramatically improve efficiency and lower cost Highlights Improve asset utilization
Simplify security management in the cloud
Simplify security management in the cloud IBM Endpoint Manager and IBM SmartCloud offerings provide complete cloud protection Highlights Ensure security of new cloud services by employing scalable, optimized
Delivering information you can trust. IBM InfoSphere Master Data Management Server 9.0. Producing better business outcomes with trusted data
Delivering information you can trust IBM InfoSphere Master Data Management Server 9.0 Producing better business outcomes with trusted data Every day, organizations generate and collect a veritable landscape
IBM WebSphere Application Server Family
IBM IBM Family Providing the right application foundation to meet your business needs Highlights Build a strong foundation and reduce costs with the right application server for your business needs Increase
How can Identity and Access Management help me to improve compliance and drive business performance?
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
IBM SmartCloud Monitoring
IBM SmartCloud Monitoring Gain greater visibility and optimize virtual and cloud infrastructure Highlights Enhance visibility into cloud infrastructure performance Seamlessly drill down from holistic cloud
Securing the Cloud through Comprehensive Identity Management Solution
Securing the Cloud through Comprehensive Identity Management Solution Millie Mak Senior IT Specialist What is Cloud Computing? A user experience and a business model Cloud computing is an emerging style
IBM Security Access Manager for Web
IBM Security Access Manager for Web Secure user access to web applications and data Highlights Implement centralized user authentication, authorization and secure session management for online portal and
Easily deploy and move enterprise applications in the cloud
Easily deploy and move enterprise applications in the cloud IBM PureApplication solutions offer a simple way to implement a dynamic hybrid cloud environment 2 Easily deploy and move enterprise applications
Logging and Alerting for the Cloud
Logging and Alerting for the Cloud What you need to know about monitoring and tracking across your enterprise The need for tracking and monitoring is pervasive throughout many aspects of an organization:
Achieve greater efficiency in asset management by managing all your asset types on a single platform.
Asset solutions To support your business objectives Achieve greater efficiency in asset by managing all your asset types on a single platform. When you use Maximo Asset Management to help maximize the
Optimize workloads to achieve success with cloud and big data
IBM Software Thought Leadership White Paper December 2012 Optimize workloads to achieve success with cloud and big data Intelligent, integrated, cloud-enabled workload automation can improve agility and
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
Address IT costs and streamline operations with IBM service desk and asset management.
Asset management and service desk solutions To support your IT objectives Address IT costs and streamline operations with IBM service desk and asset management. Highlights Help improve the value of IT
Zend and IBM: Bringing the power of PHP applications to the enterprise
Zend and IBM: Bringing the power of PHP applications to the enterprise A high-performance PHP platform that helps enterprises improve and accelerate web and mobile application development Highlights: Leverages
Cloud computing White paper November 2009. IBM Point of View: Security and Cloud Computing
White paper November 2009 IBM Point of View: Security and Cloud Computing Page 2 Table of Contents Introduction... 3 Address cloud security the grand challenge... 4 Evaluate different models of cloud computing...
Automated, centralized management for enterprise servers
IBM Software Thought Leadership White Paper February 2012 Automated, centralized management for enterprise servers Servers present unique management challenges but IBM Endpoint Manager is up to the job
IBM Software Group. Deliver effective governance for identity and access management.
IBM Software Group Deliver effective governance for identity and access management. June 2009 June 2009 Deliver effective governance for identity and access management. Today, companies face many hurdles
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY How Can I Both Enable and Protect My Organization in the New Application Economy? CA Security solutions can help you enable and protect your business
Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.
Security management solutions White paper IBM Tivoli and Consul: Facilitating security audit and March 2007 2 Contents 2 Overview 3 Identify today s challenges in security audit and compliance 3 Discover
Reducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
Dell One Identity Manager Scalability and Performance
Dell One Identity Manager Scalability and Performance Scale up and out to ensure simple, effective governance for users. Abstract For years, organizations have had to be able to support user communities
IBM Software IBM Business Process Management Suite. Increase business agility with the IBM Business Process Management Suite
IBM Software IBM Business Process Management Suite Increase business agility with the IBM Business Process Management Suite 2 Increase business agility with the IBM Business Process Management Suite We
Security and HIPAA Compliance
Contents Meeting the Challenge of HIPAA...3 Key areas of risk...3 Solutions for meeting the challenge of HIPAA...5 Mapping to HIPAA...5 Conclusion...7 About NetIQ...7 About Attachmate...7 Security and
1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges
1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges
IBM Maximo technology for business and IT agility
IBM Software Tivoli March 2010 IBM Maximo technology for business and IT agility IBM asset and service management solutions 2 IBM Maximo technology for business and IT agility Contents 2 Executive summary
Realizing business flexibility through integrated SOA policy management.
SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished
How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise
Understanding the real risk for asset-intensive companies
IBM Software Thought Leadership White Paper December 2011 Understanding the real risk for asset-intensive companies Five myths behind the value of ERP solutions as an asset management tool 2 Understanding
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems Proactively address regulatory compliance requirements and protect sensitive data in real time Highlights Monitor and audit data activity
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Answers to Top BRMS Questions
November 2009 Answers to Top BRMS Questions Answers to ten frequently asked questions about what business rule management systems are and how they are used Brett Stineman Product Marketing, Business Rules
HP Private Cloud Solutions
HP Private Cloud Solutions Get on the fast track to on-demand shared services delivery Solution brief Quickly moving toward the cloud More and more organizations are realizing the benefits of a dramatically
IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities.
Application integration solutions To support your IT objectives IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities. Market conditions and business
Empowering intelligent utility networks with visibility and control
IBM Software Energy and Utilities Thought Leadership White Paper Empowering intelligent utility networks with visibility and control IBM Intelligent Metering Network Management software solution 2 Empowering
CA Federation Manager
PRODUCT BRIEF: CA FEDERATION MANAGER CA FEDERATION MANAGER PROVIDES STANDARDS-BASED IDENTITY FEDERATION CAPABILITIES THAT ENABLE THE USERS OF ONE ORGANIZATION TO EASILY AND SECURELY ACCESS THE DATA AND
IBM Tivoli Remote Control
Robust remote desktop management across the enterprise IBM Tivoli Remote Control Highlights Enables organizations to Supports Federal Desktop Core remotely manage thousands of Configuration (FDCC) and
The business value of improved backup and recovery
IBM Software Thought Leadership White Paper January 2013 The business value of improved backup and recovery The IBM Butterfly Analysis Engine uses empirical data to support better business results 2 The
