Search

1 to 10 of 10
Sort by

Blog Entry
Customizing default messages from Verify

Introduction IBM Security Verify provides a variety of messages on various pages. When client build their customized experience they do wish to change the message content which are shown by Verify. As those messages are coming from Verify system, there is no direct way to change them. But...

Nilesh Atal's profile image



Blog Entry
Securing API Client access over the trusted IPs

Introduction IBM Security Verify provides a vast collection of APIs which developers can leverage to build their own programming. In order to secure API access, an API client needs to be created which is used to generate the access token. Access token has powerful capability and hence use...

Nilesh Atal's profile image

Blog Entry
Identity Linking in IBM Security Verify

Introduction IBM Security Verify offers an unique feature to link various user accounts of an user as one identity. This will help to have same user experience for an user although he login using his / her different authentication provider. Configuration 1. Tenant administrator...

Nilesh Atal's profile image

Blog Entry
New Feature Alert: User Risk Management for identifying top risky users with endpoint management

As an Info-Sec manager, Do you find it challenging to identity top risky users in your organization? Do you have visibility of incidents that termed them as risky users? Does your endpoint manager give you the ability to configure risk rules? This is where User Risk...

Vijay Lele's profile image


Blog Entry
Plenty of Room in Z Security for "New-Collar" Developers…and for You Gamers, Plenty of Weapons

By Marilyn Thornton I’m going to be right up front with you, dear readers. This is a recruiting blog. It’s likely that if you are reading this in the IBM Security Community space, you already have a role in an IT security discipline, but there are young men and women out there who may not have...

Marilyn Thornton's profile image

Library Entry
Featured Presentation from IBM VP & CTO Sridhar Muppidi: Continuous Security for Hybrid Multicloud

Organizations must adopt the cloud to drive digital transformation but this presents some new challenges and concerns for IT leaders, that must operate and maintain business as usual, even with more complex, hybrid and multi-cloud environments. Take a look at this presentation and learn how to...

Continuous Security for Hybrid Multi Cloud.pptx


Blog Entry
Think 2020 Call for Speakers is OPEN!

The Think 2020 Call for Speakers is open! May 4-7 San Francisco. It's time to think about Think 2020 and we want to hear from our IBM Security Community. Tell us your story and submit your proposal, the more technical the better! Opportunities you’ll have as a speaker at Think • ...

Wendy Batten's profile image