1 to 10 of 17
Sort by

Blog Entry
What's new in IAM service for IBM Cloud Paks

Authors: Yanni Zhang, Jose Ortiz Reviewers: Derek Rutledge, Lesia Cox IAM (Identity and Access Management) service is part of the IBM Cloud Pak foundational services. It provides key identity and access management capabilities to all IBM Cloud Paks. The journey to align with a common UI...

Yanni Zhang's profile image

Blog Entry
Whats New ! API Connect Reserved Instance - Configure IAM

More and more people are signing up to IBM API Connect Reserved Instance. IBM API Connect Reserved Instance allows you to have all the benefits of API Connect while IBM manages the infrastructure so you can just bring your developers and publish APIs. Also you can bring in additional Gateway...

Christopher Phillips's profile image

Library Entry
Read the new Security case study featuring IBM Champion Vinita Bhushan and Pontis Research

Vinita Bhushan is an expert in Information Security, specializing in Identity & Access Management, Federation and Security Governance and Controls. Read how Vinita and Pontis Research helped an asset management firm increase business agility with cloud-based identity management in this new ...

Library Entry
IBM PAM Ask the Experts Series: Demonstrated Use Cases

In this session, we’ll review key use cases for IBM Secret Server & IBM Privilege Manager. Join us to learn how to discover, secure, manage, and monitor privileged accounts, as well as lock down end user machines. Learn the importance of privileged access management, endpoint security and...

USe Cases with PAM-Live Webinar Presentation_6_01_2020.pdf

Katherine Cola's profile image

Library Entry
An Overview of Cloud Identity REST APIs

Summary In this session, we will be discussing the functionality provided by Cloud Identity to customers to administrate their CI tenant. By utilizing this functionality, it will allow customers to administer many aspects of their tenant without the need for engaging Cloud Identity Support. We...


Katherine Cola's profile image

Library Entry
Identity & Access Management Capabilities to Support Remote Work

Summary With the influx in remote work, your organization needs to ensure that the right people have the right to access the right systems and applications while working from home. Identity Governance & Administration (IGA) solutions help you manage and provision user access, as well as...


Katherine Cola's profile image

Library Entry
Replicate Reverse Proxies Across Multiple ISAM Appliances

Summary The reverse proxy is a core component of IBM Security Access Manager. The reverse proxy blocks unwanted access and retrieves resources from back-end servers for authorized users. This presentation will review all methods, new and old, to replicate reverse proxies across multiple ISAM...


Wendy Batten's profile image