1 to 10 of 23
Sort by

Blog Entry
Identity Linking in IBM Security Verify

Introduction IBM Security Verify offers an unique feature to link various user accounts of an user as one identity. This will help to have same user experience for an user although he login using his / her different authentication provider. Configuration 1. Tenant administrator...

Nilesh Atal's profile image

Tech Day: Developing and protecting apps with IBM Security Verify

By 2023, 80% of organizations may fail to meet security, privacy, usability and scale requirements if IAM teams don’t deliver technical guidance to developers, according to Gartner. With development cycles iterating on new apps and services faster than ever, developers need options—whether that...

 Tue May 25, 2021 | 10:00 AM - 01:00 PM ET

Library Entry
Right Person, Right Role, Right Access Just Got Easier

As part of our continuous efforts to modernize and keep ahead of the demand for new governance capabilities, Identity Governance and Intelligence is now officially part of the IBM Security Verify brand family and includes new features for 2021: a new intuitive interface for access certification,...

Katherine Cola's profile image

Library Entry
Lock in your customers with IBM Security Privileged Access Management!

Privileged Access Management (PAM) is a hot topic with significant growth of more than 20% year on year. Many of your customers are looking for such a solution. PAM has become a critical initiative for cyber defense. You can offer a complementary solution to your service, enrich your QRadar...

Christine Arnold's profile image

Blog Entry
Social Login with LinkedIn on IBM Security Verify

Co-authored by Saloni Rathi . Social Login with LinkedIn on IBM Security Verify As a user if I am going to a website or application and the first thing application asks is for registration and lot of information. I don't want to share too much information while registration. I don't...

Vandana Verma Sehgal's profile image

Blog Entry
Identity and Access Management with IBM Security Verify

For decades IBM has been a key player in the Identity & Access Management (IAM) space, innovating on its solutions and adapting to new business challenges, compliance requirements and technologies. Throughout that evolution, IBM's IAM offerings have greatly evolved into a modern portfolio,...

Katherine Cola's profile image

Blog Entry
Get the Mobile Network Advantage when you Integrate ZenKey with IBM Security Verify

As a cloud native identity-as-a-service (IDaaS) solution, IBM Security Verify can continuously iterate to keep up with authentication standards, protocols, and trends in the market. Verify provides users wide authentication options like biometrics, QR codes or even FIDO2 hard tokens, along with...

Michael Keane's profile image

Blog Entry
We Have a Winner: KuppingerCole Puts IBM Identity Governance and Intelligence in All Three Leader Quadrants for 2020

That’s right. The results are in. IBM Identity Governance and Intelligence —soon to be part of the Verify family and branded IBM Verify Governance—has been ranked by KuppingerCole in the top quadrant of all three of their leadership categories in their 2020 report. The highlights include: ...

Deepak Kanwar's profile image

Blog Entry
Interested in joining the IBM Security Verify Access Early Access Program?

Are you interested in learning more about the new product features planned for upcoming releases of IBM Security Verify Access? Would you like the opportunity to try a Beta version of an upcoming IBM Security Verify Access release and the ability to give feedback regarding new product features?...

Ann-Louise BOLGER's profile image