Search

1 to 10 of 21
Sort by

Blog Entry
Latest edition of Guardium Data Protection (v11.4) is available today!

IBM Security Guardium Data Protection helps secure your sensitive data, wherever it resides, and align your security strategy with zero trust principles to tackle key initiatives such as addressing data privacy, insider threat, and cloud security. In our continued efforts to help you to evolve...


Blog Entry
Customizing default messages from Verify

Introduction IBM Security Verify provides a variety of messages on various pages. When client build their customized experience they do wish to change the message content which are shown by Verify. As those messages are coming from Verify system, there is no direct way to change them. But...

Nilesh Atal's profile image



Blog Entry
Securing API Client access over the trusted IPs

Introduction IBM Security Verify provides a vast collection of APIs which developers can leverage to build their own programming. In order to secure API access, an API client needs to be created which is used to generate the access token. Access token has powerful capability and hence use...

Nilesh Atal's profile image

Blog Entry
Identity Linking in IBM Security Verify

Introduction IBM Security Verify offers an unique feature to link various user accounts of an user as one identity. This will help to have same user experience for an user although he login using his / her different authentication provider. Configuration 1. Tenant administrator...

Nilesh Atal's profile image

Blog Entry
New Feature Alert: User Risk Management for identifying top risky users with endpoint management

As an Info-Sec manager, Do you find it challenging to identity top risky users in your organization? Do you have visibility of incidents that termed them as risky users? Does your endpoint manager give you the ability to configure risk rules? This is where User Risk...

Vijay Lele's profile image