Search

1 to 10 of 11
Sort by

Blog Entry
Latest edition of Guardium Data Protection (v11.4) is available today!

IBM Security Guardium Data Protection helps secure your sensitive data, wherever it resides, and align your security strategy with zero trust principles to tackle key initiatives such as addressing data privacy, insider threat, and cloud security. In our continued efforts to help you to evolve...

CYNTHIA LUU's profile image

Blog Entry
Customizing default messages from Verify

Introduction IBM Security Verify provides a variety of messages on various pages. When client build their customized experience they do wish to change the message content which are shown by Verify. As those messages are coming from Verify system, there is no direct way to change them. But...

Nilesh Atal's profile image



Blog Entry
Securing API Client access over the trusted IPs

Introduction IBM Security Verify provides a vast collection of APIs which developers can leverage to build their own programming. In order to secure API access, an API client needs to be created which is used to generate the access token. Access token has powerful capability and hence use...

Nilesh Atal's profile image

Blog Entry
Identity Linking in IBM Security Verify

Introduction IBM Security Verify offers an unique feature to link various user accounts of an user as one identity. This will help to have same user experience for an user although he login using his / her different authentication provider. Configuration 1. Tenant administrator...

Nilesh Atal's profile image

Blog Entry
New Feature Alert: User Risk Management for identifying top risky users with endpoint management

As an Info-Sec manager, Do you find it challenging to identity top risky users in your organization? Do you have visibility of incidents that termed them as risky users? Does your endpoint manager give you the ability to configure risk rules? This is where User Risk...

Vijay Lele's profile image


Blog Entry
Plenty of Room in Z Security for "New-Collar" Developers…and for You Gamers, Plenty of Weapons

By Marilyn Thornton I’m going to be right up front with you, dear readers. This is a recruiting blog. It’s likely that if you are reading this in the IBM Security Community space, you already have a role in an IT security discipline, but there are young men and women out there who may not have...

Marilyn Thornton's profile image

Library Entry
Featured Presentation from IBM VP & CTO Sridhar Muppidi: Continuous Security for Hybrid Multicloud

Organizations must adopt the cloud to drive digital transformation but this presents some new challenges and concerns for IT leaders, that must operate and maintain business as usual, even with more complex, hybrid and multi-cloud environments. Take a look at this presentation and learn how to...

Continuous Security for Hybrid Multi Cloud.pptx