Search

1 to 10 of 15
Sort by

Library Entry
Read the new Security case study featuring IBM Champion Vinita Bhushan and Pontis Research

Vinita Bhushan is an expert in Information Security, specializing in Identity & Access Management, Federation and Security Governance and Controls. Read how Vinita and Pontis Research helped an asset management firm increase business agility with cloud-based identity management in this new ...


Library Entry
IBM PAM Ask the Experts Series: Demonstrated Use Cases

In this session, we’ll review key use cases for IBM Secret Server & IBM Privilege Manager. Join us to learn how to discover, secure, manage, and monitor privileged accounts, as well as lock down end user machines. Learn the importance of privileged access management, endpoint security and...

USe Cases with PAM-Live Webinar Presentation_6_01_2020.pdf

Katherine Cola's profile image

Library Entry
An Overview of Cloud Identity REST APIs

Summary In this session, we will be discussing the functionality provided by Cloud Identity to customers to administrate their CI tenant. By utilizing this functionality, it will allow customers to administer many aspects of their tenant without the need for engaging Cloud Identity Support. We...

CI-RAPI-webinar-2020-05-28.pdf

Katherine Cola's profile image

Library Entry
Identity & Access Management Capabilities to Support Remote Work

Summary With the influx in remote work, your organization needs to ensure that the right people have the right to access the right systems and applications while working from home. Identity Governance & Administration (IGA) solutions help you manage and provision user access, as well as...

CloudIdentityAnalyze_remoteworker_5_27_2020.pdf

Katherine Cola's profile image


Library Entry
Replicate Reverse Proxies Across Multiple ISAM Appliances

Summary The reverse proxy is a core component of IBM Security Access Manager. The reverse proxy blocks unwanted access and retrieves resources from back-end servers for authorized users. This presentation will review all methods, new and old, to replicate reverse proxies across multiple ISAM...

Reverse_proxy_replication_webinar_5_4.pdf

Wendy Batten's profile image