Provide access control with innovative solutions from IBM.



Similar documents
Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Security management solutions White paper. Extend business reach with a robust security infrastructure.

When millions need access: Identity management in an increasingly connected world

White paper December Addressing single sign-on inside, outside, and between organizations

Strengthen security with intelligent identity and access management

Preemptive security solutions for healthcare

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Address IT costs and streamline operations with IBM service desk and asset management.

IBM Tivoli Service Request Manager

Address IT costs and streamline operations with IBM service request and asset management solutions.

IBM Tivoli Compliance Insight Manager

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

Implement a unified approach to service quality management.

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

IBM Tivoli Asset Management for IT

IBM Rational AppScan: enhancing Web application security and regulatory compliance.

IBM asset management solutions White paper. Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations.

IBM Service Management solutions White paper. Make ITIL actionable with Tivoli software.

Realizing business flexibility through integrated SOA policy management.

IBM Tivoli Federated Identity Manager

IBM Security Privileged Identity Manager helps prevent insider threats

Driving workload automation across the enterprise

Extend the value of your service desk and integrate ITIL processes with IBM Tivoli Change and Configuration Management Database.

Enhance visibility into and control over software projects IBM Rational change and release management software

Life insurance policy administration: Operate efficiently and capitalize on emerging opportunities.

IBM Maximo Asset Management for IT

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Integration and Infrastructure Software. IBM WebSphere Application Server Family. Flexible infrastructure for todayʼs business world.

How can Identity and Access Management help me to improve compliance and drive business performance?

ROUTES TO VALUE. Business Service Management: How fast can you get there?

Modernizing enterprise application development with integrated change, build and release management.

Quest One Identity Solution. Simplifying Identity and Access Management

IBM and ACI Worldwide Providing comprehensive, end-to-end electronic payment solutions for retail banking

The Challenges of Administering Active Directory

IBM Maximo technology for business and IT agility

IBM Tivoli Access Manager for Enterprise Single Sign-On

Reducing the cost and complexity of endpoint management

How To Use Ibm Tivoli Monitoring Software

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

IT service management solutions Executive brief. Making ITIL actionable in an IT service management environment.

IBM Tivoli Netcool network management solutions for SMB

The Benefits of an Integrated Approach to Security in the Cloud

IBM Tivoli Identity Manager

IBM Tivoli Netcool network management solutions for enterprise

Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL).

Consolidated security management for mainframe clouds

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

Select the right configuration management database to establish a platform for effective service management.

Stay ahead of insiderthreats with predictive,intelligent security

Safeguarding the cloud with IBM Dynamic Cloud Security

Make better underwriting decisions and help reduce loss ratios with efficient, streamlined processes.

Risk mitigation for business resilience White paper. A comprehensive, best-practices approach to business resilience and risk mitigation.

Gain a competitive edge through optimized B2B file transfer

IBM Software Cloud service delivery and management

IBM Tivoli Storage Manager

The Smart Archive strategy from IBM

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure?

IBM Tivoli Endpoint Manager for Lifecycle Management

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Overcoming challenges of asset management amid declining federal budgets

Software asset management White paper. Improving IT service delivery through an integrated approach to software asset management.

IBM Software IBM Business Process Management Suite. Increase business agility with the IBM Business Process Management Suite

Business-Driven, Compliant Identity Management

Business-Driven, Compliant Identity Management

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

Web Access Management. RSA ClearTrust. Enhancing control. Widening access. Driving e-business growth. SSO. Identity Management.

Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations

IBM Global Business Services Microsoft Dynamics AX solutions from IBM

Security solutions Executive brief. Understand the varieties and business value of single sign-on.

Achieve greater efficiency in asset management by managing all your asset types on a single platform.

Seven Things To Consider When Evaluating Privileged Account Security Solutions

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

IBM Security Intrusion Prevention Solutions

IBM Tivoli Composite Application Manager for WebSphere

Optimizing government and insurance claims management with IBM Case Manager

IBM Endpoint Manager for Core Protection

Securing and protecting the organization s most sensitive data

IBM Executive Point of View: Transform your business with IBM Cloud Applications

Introduction to SOA governance and service lifecycle management.

IBM Connections Cloud Security

Achieve greater efficiency in asset management by managing all your asset types on a single platform.

IBM Software Integrated Service Management: Visibility. Control. Automation.

Securing the Cloud through Comprehensive Identity Management Solution

Transcription:

Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business productivity Implement and manage user identities throughout the identity lifecycle Control access across diverse applications, data stores, environments and security domains Help reduce costs for business integration, help-desk and security administration through single sign-on (SSO) and automated process and workflow management Help ensure consistent execution of security policies and regulatory mandates with centralized control Integrate access and identity management within one infrastructure environment Unauthorized access to information assets is a critical, complex and growing threat to the security of today s organizations. Organizations have to know who, what, when and where in terms of accessing their logical and physical resources, from inside and outside the enterprise. IBM provides a unified strategy for enterprise security that includes powerful, cost-effective and easy-to-use identity management and access control solutions. With IBM, you can develop a solution that covers the identity management lifecycle all while addressing security needs in a compliant, costeffective and efficient fashion. Take advantage of IBM leadership in enterprise security As a world leader in enterprise security, IBM develops innovative, advanced, modular and affordable solutions to help organizations stay ahead of security threats while supporting compliance and business requirements. Drawing on our extensive experience, broad technical knowledge and deep understanding of today s security threats, IBM has developed a unified strategy for enterprise security, ranging from careful assessment of threats or potential issues to ongoing monitoring and proactive action against exposures.

IBM security solutions provide identity management and access control capabilities. Leveraging integrated identity management and access authorization solutions based on offerings from IBM Tivoli software, IBM Identity and Access Management Services and IBM Business Partners can help you: Lower risk of fraud and theft. Facilitate collaboration among employees, partners and suppliers. Reduce identity management and security operations costs. Maximize usability and profitability for your business and your partners. Streamline audit and compliance processes in a heterogeneous environment. Address identity management across the enterprise and beyond IBM provides security-rich, automated, policy-based user management solutions that help effectively manage identities, authentication and access to both Web services and legacy applications. Services such as Identity Lifecycle Management and Access Management can assist you in further leveraging the full suite of identity and access products from IBM Tivoli software. IBM Tivoli Identity Manager enables customers, employees, business partners and suppliers to access information in a security-rich, flexible and cost-effective manner. Tivoli Identity Manager helps enterprises get their employees productive quickly by automating new account creation and by providing self-care password management. With Tivoli Identity Manager, IT organizations can: Improve visibility into security management operations and quickly produce centralized reports about security policy, access rights and audit events for auditors. Establish centralized, policy-based access control and audit trails across key information systems. Use an embedded workflow engine for automated submission and approval of user requests. Automate the implementation of administrative requests by using an embedded provisioning engine. Take advantage of a sophisticated, role-based administration model for delegation of administrative privileges. Develop comprehensive access authorization solutions IBM access authorization solutions provide timely access throughout the user s lifecycle across multiple environments and security domains while enforcing security and protecting the IT environment from external threats. Services can provide you with versatile solutions for authentication and authorization problems, ranging from simple SSO to more complex security infrastructure deployments. Consistently enforce access policy IBM Tivoli Access Manager for e-business can help you manage growth and complexity, control escalating management costs and address the difficulties of implementing security policies across a wide range of Web and application resources. Tivoli Access Manager for e-business can help: Define and manage a centralized authentication, access and audit policy for a broad range of business initiatives. Establish a new audit and reporting service, which collects audit data from multiple enforcement points as well as from other platforms and security applications.

Enable flexible SSO to Web-based applications that can span multiple sites or domains, helping to reduce help-desk calls and other security problems associated with multiple passwords. Leverage a common security policy model with the Tivoli Access Manager family of products to extend support to other resources. Flexibly administer identities and access across organizations and enterprises IBM Tivoli Federated Identity Manager enables customers, suppliers and business partners to conduct business across disparate environments and multiple security domains in a protected, flexible and efficient manner. Tivoli Federated Identity Manager also delivers trust management capabilities for organizations to secure access to mainframe and distributed applications and services in a service oriented architecture (SOA) environment. Providing a simple, loosely coupled model for managing identity and access to resources, Tivoli Federated Identity Manager can help: Reduce business integration, help-desk and security administration costs with an easy-touse, rapidly deployable SSO solution. Minimize the cost and burden of creating and maintaining user identities shared across multiple business partners. Establish centralized identity mapping and token mediation for Web services. Improve compliance with tracking and auditing capabilities. Rapidly deploy and share Web-based services with business partners. IBM Tivoli Federated Identity Manager Business Gateway complements Tivoli Federated Identity Manager, providing an ideal entry point for establishing federated Web SSO capabilities. Designed for small-to-midsize organizations, Tivoli Federated Identity Manager Business Gateway can bring together customers, business partners and suppliers with a single, easy-to-deploy application that also provides a smooth migration pathway to an enterprise-level application. Simplify end-user experience with SSO IBM Tivoli Access Manager for Enterprise Single Sign-On provides a simple authentication capability across applications. The solution can simplify the end-user experience by removing the need to remember user names and passwords. It also can enhance security by eliminating poor end-user password behavior. In addition, the solution can provide fast, tangible reduction in IT help-desk costs by lowering the number of password reset calls, and it extends audit and reporting capabilities in a quick, simple-todeploy solution. When coupled with Services for Strong Authentication, the integrated solution can enable organizations to rapidly gain value from their investment in SSO. Tivoli Access Manager for Enterprise SSO can also: Work with both Tivoli Access Manager for e-business and Tivoli Identity Manager, providing a robust solution that addresses the issue of password clutter throughout the enterprise. Support different types of user authentication from passwords to smart cards to biometrics. Operate from an administrative console that simplifies administrative tasks. Offer users simple enterprise SSO while connected or disconnected to the corporate network, roaming between computers or sharing a kiosk with multiple users. Add user sign-on data automatically to audit and reporting capabilities.

Help protect against unauthorized access by privileged users IBM Tivoli Access Manager for Operating Systems is a simple-to-use, powerful security system that securely locks down business-critical applications, files and operating platforms to help prevent unauthorized access. This security capability can block both insiders and outsiders from unauthorized access to valuable customer, employee and business partner data. Tivoli Access Manager for Operating Systems also helps prevent configuration changes from being made to key applications, and it audits access of these applications to help ensure accountability for any changes made. In addition, Tivoli Access Manager for Operating Systems provides the capabilities to: Audit application and platform activity, defending against malicious or fraudulent behavior by internal users and employees. Combine full-fledged intrusion prevention, host-based firewall, application and platform protection, user tracking and controls, robust auditing and compliance checking. Provide Persistent Universal Auditing to document compliance with government regulations, corporate policy and other security mandates. Provide best-practice security policy templates to minimize implementation effort and time. Deliver enterprise-wide security and auditing in a lightweight, easy-to-use product. Take advantage of the wide range of IBM services Services can provide extensive consultation, support and other services to help customers manage growth and complexity, control escalating management costs and address the difficulties of implementing security policies across a wide range of Web and application resources. IBM: a leader in security solutions IBM has long been a world leader in security, with an ever-expanding range of experience, technical knowledge and expertise. Today, we have a global presence with more than 3,500 security and privacy experts worldwide. Backed by a network of IBM Business Partners, we can help organizations respond faster and more appropriately to security violations, threats and regulatory mandates. We also lead in security innovation, with more than 100 patents in identity management products and technologies. For example: IBM access control A rapidly growing company has made a major acquisition, with more planned in the near future. The IT organization must quickly and cost-effectively support an additional 500 users with the ability to scale to thousands across diverse IT infrastructures and security domains. A key requirement to their solution involves administration. With resources already stretched to the limit, the IT organization needs a solution that can grow in size while reducing or, at a minimum, maintaining the administrative burden and cost of identity management. Services are chosen to manage the end-to-end user lifecycle management of identities within an organization. The solution reduces IT administration costs by providing Web self-care interfaces; creating local autonomy; automatically managing accounts, credentials and access rights throughout the user lifecycle; and providing scenarios that show the impact of proposed policy changes. It also enables administrator teaming through streamlined notification, bulk to-do items management, and task ownership and delegation. An IBM solution leveraging Tivoli Federated Identity Manager supports the integration of identity and access management between companies, as well as with customers, suppliers and partners. The solution also addresses the cost of identity management by helping reduce the number of different systems, standardize the use of technology and outsource noncore functions. In addition, the company realizes a significant reduction in help-desk calls related to password issues a central benefit of SSO.

In addition, we have experience in virtually every industry, with consultants who understand the unique business problems and needs of each industry.* IBM security solutions can help organizations assess their security exposure and needs, defend themselves from internal and external threats, implement and manage user identities, provide access control across applications and data sources, and watch for security exposures and intrusion attempts. IBM access control offerings include: Identity lifecycle management IBM Tivoli Identity Manager Access policy enforcement IBM Tivoli Access Manager for e-business Identity federation IBM Tivoli Federated Identity Manager IBM Tivoli Federated Identity Manager Business Gateway Single sign-on IBM Tivoli Access Manager for Enterprise Single Sign-On Privileged-user access control IBM Tivoli Access Manager for Operating Systems Services For more information To learn more about how IBM security solutions can help you control access efficiently and effectively or to find the IBM security solutions entry point that is right for your organization contact your IBM representative or IBM Business Partner, or visit ibm.com/itsolutions/security About IBM solutions for enabling IT governance and risk management IBM enables IT organizations to support governance and risk management by aligning IT policies, processes and projects with business goals. Organizations can leverage IBM services, software and hardware to plan, execute and manage initiatives for IT service management, business resilience and security across the enterprise. Organizations of every size can benefit from flexible, modular IBM offerings that span business management, IT development and IT operations and draw on extensive customer experience, best practices and open standards based technology. IBM helps clients implement the right IT solutions to achieve rapid business results and become a strategic partner in business growth. For more information about IBM Governance and Risk Management, visit ibm.com/itsolutions/governance

Copyright IBM Corporation 2007 IBM Corporation Route 100 Somers, NY 10589 U.S.A. Produced in the United States of America 3-07 All Rights Reserved IBM, the IBM logo and Tivoli are trademarks of International Business Machines Corporation in the United States, other countries or both. Other company, product and service names may be trademarks or service marks of others. Disclaimer: The customer is responsible for ensuring compliance with legal requirements. It is the customer s sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer s business and any actions the reader may have to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law or regulation. * ibm.com/solutions/au/itsolutions/identityman/ business.html GMS10331-USEN-00