1 to 10 of 18
Sort by

Blog Entry
Join IBM’s Security Experts and Technical Leaders at Virtual Master Skills University, Sept. 13-16 — Registration is Now Open!

Great news – your opportunity for deep-dive, hands-on, expert-grade technical training across IBM Security’s industry-leading cyber solutions is back! I am thrilled to announce that registration is open for the IBM Security Virtual Master Skills University from Sept. 13-16, 2021. ...

Bob Kalka's profile image

Blog Entry
IBM Security and Microsoft: Partnering to accelerate your hybrid multi-cloud business

An open and unified approach to security in hybrid cloud Hybrid cloud adoption is growing fast. To protect your organization from threats, your security teams should adopt and champion an open and unified approach across on-premises and cloud environments. The primary task is to connect...

Chris McCurdy's profile image

Library Entry
On-demand webinar: Discover IBM Security Expert Essentials — Build Your Skills and Get Software Support You Can Trust

As someone working in the security industry, you understand better than most that the ongoing migration of applications and systems to the cloud does not do away with concerns about data security, compliance risk, threats and vulnerabilities. In many cases, cloud adoption and transformation only...

Library Entry
Virtual Master Skills University 2020 — On-demand

All the deep, dive technical content from Virtual Master Skills University, held in September 2020, is now available to watch at your convenience on the IBM Security Learning Academy. Log in using your IBM ID, then choose the product track(s) of your choice. Content, including video lectures,...

Blog Entry
Extend user attribute management in Verify for complex use cases with IBM Cloud Functions

It is very unlikely that user repositories, such as Active Directory or Security Directory Server, will contain all data associated with the user. It is also less likely that these directories have the data in the right format that applications expect. To normalize data in an IAM tool is a...

Adam Case's profile image

Blog Entry
How to Troubleshoot Missing Traffic in Guardium

Missing Traffic You're a Guardium admin. It's Monday morning. One of your stakeholders tells you the email they usually get from the Guardium audit process never arrived, or it arrived but there is no data at all in the report, or there is some data but important data is missing. What can you...

John Adams's profile image

Blog Entry
Adopting modernized identity governance in a hybrid world

Co-Authored by Erika Weiler. With today’s complex IT requirements, organizations often craft a hybrid multicloud environment with applications living on-premises, in a private cloud and as software-as-a-service (SaaS). This has made it difficult to enforce identity and governance policies,...

MRINALINI RANJAN's profile image

Blog Entry
ADFS 3.0 Step-by-Step Guide: Federation with IBM Security Verify Access

Abstract This documentation provides instructions to configure a basic identity federation deployment between Microsoft® Active Directory® Federation Services 3.0 (AD FS 3.0) and IBM Security Verify Access by using the SAML 2.0 protocol, specifically the Web Browser SSO Profile and HTTP POST...

Haan Ming Lim's profile image