Search

1 to 10 of 21
Sort by

Library Entry
Right Person, Right Role, Right Access Just Got Easier

As part of our continuous efforts to modernize and keep ahead of the demand for new governance capabilities, Identity Governance and Intelligence is now officially part of the IBM Security Verify brand family and includes new features for 2021: a new intuitive interface for access certification,...

Katherine Cola's profile image

Library Entry
Lock in your customers with IBM Security Privileged Access Management!

Privileged Access Management (PAM) is a hot topic with significant growth of more than 20% year on year. Many of your customers are looking for such a solution. PAM has become a critical initiative for cyber defense. You can offer a complementary solution to your service, enrich your QRadar...

Christine Arnold's profile image

Blog Entry
Social Login with LinkedIn on IBM Security Verify

Co-authored by Saloni Rathi . Social Login with LinkedIn on IBM Security Verify As a user if I am going to a website or application and the first thing application asks is for registration and lot of information. I don't want to share too much information while registration. I don't...

Vandana Verma Sehgal's profile image

Blog Entry
Identity and Access Management with IBM Security Verify

For decades IBM has been a key player in the Identity & Access Management (IAM) space, innovating on its solutions and adapting to new business challenges, compliance requirements and technologies. Throughout that evolution, IBM's IAM offerings have greatly evolved into a modern portfolio,...

Katherine Cola's profile image

Blog Entry
Get the Mobile Network Advantage when you Integrate ZenKey with IBM Security Verify

As a cloud native identity-as-a-service (IDaaS) solution, IBM Security Verify can continuously iterate to keep up with authentication standards, protocols, and trends in the market. Verify provides users wide authentication options like biometrics, QR codes or even FIDO2 hard tokens, along with...

Michael Keane's profile image

Blog Entry
We Have a Winner: KuppingerCole Puts IBM Identity Governance and Intelligence in All Three Leader Quadrants for 2020

That’s right. The results are in. IBM Identity Governance and Intelligence —soon to be part of the Verify family and branded IBM Verify Governance—has been ranked by KuppingerCole in the top quadrant of all three of their leadership categories in their 2020 report. The highlights include: ...

Deepak Kanwar's profile image

Blog Entry
Interested in joining the IBM Security Verify Access Early Access Program?

Are you interested in learning more about the new product features planned for upcoming releases of IBM Security Verify Access? Would you like the opportunity to try a Beta version of an upcoming IBM Security Verify Access release and the ability to give feedback regarding new product features?...

Ann-Louise BOLGER's profile image

Blog Entry
10.2.2020 - IBM Security Verify Features and Functionality Enhancements

Quickly download session data for adaptive access troubleshooting This enhancement enables the tenant admin to effectively interact with IBM support when dealing with Adaptive Access support tickets. The tenant admin can now download the entire Adaptive Access report as a json file,...

Jen Mulligan's profile image

Library Entry
Virtual Master Skills University 2020 — On-demand

All the deep, dive technical content from Virtual Master Skills University, held in September 2020, is now available to watch at your convenience on the IBM Security Learning Academy. Log in using your IBM ID, then choose the product track(s) of your choice. Content, including video lectures,...