Search

1 to 10 of 24
Sort by

Blog Entry
Video: Commercial International Bank of Egypt's Zero Trust Journey with IBM Security

Working with IBM Security Services, Commercial International Bank implemented IBM Security Verify Governance technology and improved its user access management, leaving the daunting manual processes behind. Going further to secure its business, protect its assets and manage user access, CIB...

Christine Arnold's profile image

Blog Entry
Customizing default messages from Verify

Introduction IBM Security Verify provides a variety of messages on various pages. When client build their customized experience they do wish to change the message content which are shown by Verify. As those messages are coming from Verify system, there is no direct way to change them. But...

Nilesh Atal's profile image

Blog Entry
Securing API Client access over the trusted IPs

Introduction IBM Security Verify provides a vast collection of APIs which developers can leverage to build their own programming. In order to secure API access, an API client needs to be created which is used to generate the access token. Access token has powerful capability and hence use...

Nilesh Atal's profile image

Blog Entry
Identity Linking in IBM Security Verify

Introduction IBM Security Verify offers an unique feature to link various user accounts of an user as one identity. This will help to have same user experience for an user although he login using his / her different authentication provider. Configuration 1. Tenant administrator...

Nilesh Atal's profile image


Blog Entry
Social Login with LinkedIn on IBM Security Verify

Co-authored by Saloni Rathi . Social Login with LinkedIn on IBM Security Verify As a user if I am going to a website or application and the first thing application asks is for registration and lot of information. I don't want to share too much information while registration. I don't...

Vandana Verma Sehgal's profile image

Blog Entry
Identity and Access Management with IBM Security Verify

For decades IBM has been a key player in the Identity & Access Management (IAM) space, innovating on its solutions and adapting to new business challenges, compliance requirements and technologies. Throughout that evolution, IBM's IAM offerings have greatly evolved into a modern portfolio,...

Katherine Cola's profile image

Blog Entry
Get the Mobile Network Advantage when you Integrate ZenKey with IBM Security Verify

As a cloud native identity-as-a-service (IDaaS) solution, IBM Security Verify can continuously iterate to keep up with authentication standards, protocols, and trends in the market. Verify provides users wide authentication options like biometrics, QR codes or even FIDO2 hard tokens, along with...

Michael Keane's profile image

Blog Entry
We Have a Winner: KuppingerCole Puts IBM Identity Governance and Intelligence in All Three Leader Quadrants for 2020

That’s right. The results are in. IBM Identity Governance and Intelligence —soon to be part of the Verify family and branded IBM Verify Governance—has been ranked by KuppingerCole in the top quadrant of all three of their leadership categories in their 2020 report. The highlights include: ...

Deepak Kanwar's profile image